Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2024, 04:34

General

  • Target

    2024-02-03_ab018e3db7e8223b67e69aa11f3f020e_cryptolocker.exe

  • Size

    48KB

  • MD5

    ab018e3db7e8223b67e69aa11f3f020e

  • SHA1

    181d53ae41c63a2ae51af39861fac787e847397c

  • SHA256

    9faa9d8748012be8b953658d04d9d1db2f5bbc5f871237fb30c4d36d955cb2f6

  • SHA512

    7fba8be570d6a07dac8da961fb3320874bf60e382cafdba3ae39736682bfcfc3cd041dbccce98e62afe361253916c669edbf4571ea12c0eeed52596dad0854a6

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjeJQ7pojakNm:V6a+pOtEvwDpjN

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-03_ab018e3db7e8223b67e69aa11f3f020e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-03_ab018e3db7e8223b67e69aa11f3f020e_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    49KB

    MD5

    8ad6f5248a403b61309c6bf99944f462

    SHA1

    3801892d109d0bf458737615226967d29dc8fdec

    SHA256

    a4a7707a53e77c18efb605c3dbfc243046e75f061be929f5380de949b05c9ed3

    SHA512

    de7b69070d2a6a178c041e2fb9920d73bd8b67d1a60cd052bea3a274605bccaca656d084062538728dae4f5c0679559e76c3ddb4f5043ad978362325bffbba1f

  • memory/2432-0-0x00000000020D0000-0x00000000020D6000-memory.dmp

    Filesize

    24KB

  • memory/2432-1-0x00000000020D0000-0x00000000020D6000-memory.dmp

    Filesize

    24KB

  • memory/2432-2-0x00000000020F0000-0x00000000020F6000-memory.dmp

    Filesize

    24KB

  • memory/4004-23-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB