Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2024, 10:12

General

  • Target

    2024-02-12_c642e1795d55ee5cdef5f4bdfe068970_cryptolocker.exe

  • Size

    36KB

  • MD5

    c642e1795d55ee5cdef5f4bdfe068970

  • SHA1

    ae896e4081629244e98b07e422167bc2e8e67854

  • SHA256

    51ee684e07daef593a3151c415f12997d56010a22830c0b85b678e5092ca0c85

  • SHA512

    a76930afca199069d7f08b32b31d4a6baa5360936f473815173829044fa1b75fb98e3c5cf59317c41aa14b5def63660f7dbbcba1192602f926833a2ac392d947

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFCY:X6QFElP6n+gJQMOtEvwDpjBmzDUY

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-12_c642e1795d55ee5cdef5f4bdfe068970_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-12_c642e1795d55ee5cdef5f4bdfe068970_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3664
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    36KB

    MD5

    e3712117f0ed40d1e0ba553bb6c69c81

    SHA1

    e16606b18e19596828e845f005766426d445471d

    SHA256

    0ff8f25ab28d79ac547374f9084c3c96e0855f33aaf13c96a644b339a8f0e670

    SHA512

    5899f3144625c77570dc27bffea88d44c2dfe9c3ef1e17e1feebc2cf29c39bb44cf850b442f0c0e399d73e19d4fb83bf88aebff88bb4bd045307af79c75071c6

  • memory/2272-17-0x0000000000510000-0x0000000000516000-memory.dmp

    Filesize

    24KB

  • memory/2272-19-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3664-0-0x00000000007F0000-0x00000000007F6000-memory.dmp

    Filesize

    24KB

  • memory/3664-1-0x00000000007F0000-0x00000000007F6000-memory.dmp

    Filesize

    24KB

  • memory/3664-2-0x0000000000810000-0x0000000000816000-memory.dmp

    Filesize

    24KB