Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-02-2024 04:08

General

  • Target

    2024-02-03_88e27347d66a97520cb53274c7fc02cb_cryptolocker.exe

  • Size

    99KB

  • MD5

    88e27347d66a97520cb53274c7fc02cb

  • SHA1

    ceaa1c8cfe7a6cdf918163b3c2a6ff0de7d2ad35

  • SHA256

    10980a1ff1828640b371404349b4d636b6991638f5a32574dd76212b92daf943

  • SHA512

    47ccb332152b12979ec718a333f8930825fdf9f39701039a77ca43bac3eac200a6ca435ec623c2b5da0bd87dd5f55f8776d1e6da371b1bb7ffab2ac02d844deb

  • SSDEEP

    1536:26QFElP6n+gBQMOtEvwDpjQGYQbN/PKwNCWwI7:26a+2OtEvwDpjtz/

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-03_88e27347d66a97520cb53274c7fc02cb_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-03_88e27347d66a97520cb53274c7fc02cb_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3324
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    99KB

    MD5

    bdb2d4625bae1ef7d13ea2f13bff342f

    SHA1

    11a12d8931d6e1de38e5a8b21e2b99033f8f1f95

    SHA256

    6427d2bc7f46104d2982f0e14131b308471cdab50032e6249cf83371645f4a94

    SHA512

    0665cd39ce207f4c360d5a35ff7ea18c8e3f850edac549c53315f2043022890fd5d09f582581ab61f7d55c7969b6c433c632c18398863fcdd242d9f9e811541a

  • memory/3324-0-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/3324-2-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB

  • memory/3324-1-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/4216-17-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/4216-23-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB