Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/01/2024, 16:37

General

  • Target

    2024-01-29_b67b027c65d78e289f5d3ccd40eb5ec4_cryptolocker.exe

  • Size

    73KB

  • MD5

    b67b027c65d78e289f5d3ccd40eb5ec4

  • SHA1

    deb335c9eb294fb80e053c98c057f1a47bde5812

  • SHA256

    1534888536cd19b957105b5f1f3f9136c9095df69428a7cfee3167241db34453

  • SHA512

    6e75c15359026caeefe2a7a0c513c5f5dd2ff1118b216ab6e18b10817a71f44994af4fc04b9101ebce8b629254a800f4c733283b7b458478f54ae5a3d42bfcfc

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1RR:X6a+SOtEvwDpjBZYvQd23

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-29_b67b027c65d78e289f5d3ccd40eb5ec4_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-29_b67b027c65d78e289f5d3ccd40eb5ec4_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    74KB

    MD5

    7b3eef7192fbc81c63acc52bf294442e

    SHA1

    3e38159d80b72036b9e7a5b8ded59ccc207edbd9

    SHA256

    68fc0377d867171e9c3ce09b9d7ff6b12e0f70e87d736236c5dedc72af46af8a

    SHA512

    1d03a8241e1d86c6356a145487001b90eebbd95dbd8e2870b4a2001551088c92b6d869fb5efe2dfd0be024b9075f955a350a83d1c00f38d357684b624316c96c

  • memory/2480-17-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/2480-23-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/2888-0-0x00000000006F0000-0x00000000006F6000-memory.dmp

    Filesize

    24KB

  • memory/2888-1-0x00000000006F0000-0x00000000006F6000-memory.dmp

    Filesize

    24KB

  • memory/2888-2-0x0000000000720000-0x0000000000726000-memory.dmp

    Filesize

    24KB