Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2024, 09:05

General

  • Target

    2024-02-01_fe81f680015e02c3a53579628720a564_cryptolocker.exe

  • Size

    92KB

  • MD5

    fe81f680015e02c3a53579628720a564

  • SHA1

    29b37dfbc01e4f4668a2b35a50975adc7f9ba190

  • SHA256

    568ec1f7c65417a728dbef3e1c2d7b32186ab5a69acd63bddc1110cc649bef57

  • SHA512

    cd7fd2cc0973923868b25beb4754867a829444af3b54ec7324fbf97a0d46c486c7e079eb492b58f3caa81382d154475409e75bf28b0e27273457fcaefb3e3055

  • SSDEEP

    1536:26QFElP6n+gBQMOtEvwDpjQGYQbN/PKwNCg:26a+2OtEvwDpjtzr

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-01_fe81f680015e02c3a53579628720a564_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-01_fe81f680015e02c3a53579628720a564_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    92KB

    MD5

    4fc21ff7664659768018c9664c9e0fba

    SHA1

    a2e87ba69ebf5ccbb9d8b3854b29bbf4bdbeac41

    SHA256

    d827bce5b3046776fc36d8d41a1e15fefb47781730697e71fc18b30de7cf4fb1

    SHA512

    e09846aeb378656bc81ec2ae2db1b6c075ce82ddc1c1c2d031b7cab6a5e9b4d85d44778f5545bc6cc803046acf95d133533983d129687bd77247a5521e8688dd

  • memory/1264-0-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/1264-1-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/1264-2-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB

  • memory/2784-17-0x00000000020F0000-0x00000000020F6000-memory.dmp

    Filesize

    24KB

  • memory/2784-20-0x00000000020D0000-0x00000000020D6000-memory.dmp

    Filesize

    24KB