Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2024, 14:25

General

  • Target

    2024-02-03_6152f2cf48f9b0d364017584d9fd7f57_cryptolocker.exe

  • Size

    69KB

  • MD5

    6152f2cf48f9b0d364017584d9fd7f57

  • SHA1

    5d72047027599ab07d1913142ab3004a8ebee446

  • SHA256

    647fccff612f22cfde6ff1956ab57d04e2a168edf4f80519c5f8b150ab96e1a9

  • SHA512

    72adf60f489e56440782de7116446676a3e333dc93fbee387ad8460c695c8c864d8b26ab84346d4a108fb8bc365be4354b67d2c7d4586b69b7b00e39da312a91

  • SSDEEP

    1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKUNZOuE:DW60sllyWOtEvwDpjwF85y

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-03_6152f2cf48f9b0d364017584d9fd7f57_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-03_6152f2cf48f9b0d364017584d9fd7f57_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4444
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    69KB

    MD5

    8a0a42a8c6b895720ad9258676a90404

    SHA1

    51975716a67ad2e9732cec938c076a731a38c3c3

    SHA256

    95ff530c5b03bd4714d9ad561a508ee1516b96d4d6ee9a9c4fb9fa2bb1df21c9

    SHA512

    83db14446f245dc5b5c32207747ff617ec3bfc57872f353a390fd0ef2b28ec4e7dfc1f8306d74e5d59d930f1e9906a396fb782f4a8ab980bf44cb1346dce38ab

  • memory/4088-18-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/4088-20-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/4088-21-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/4444-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/4444-1-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/4444-3-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/4444-2-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/4444-17-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB