Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-02-2024 18:31

General

  • Target

    2024-02-12_e3a32a3cfa4a50415a60692e4e8cca0b_cryptolocker.exe

  • Size

    38KB

  • MD5

    e3a32a3cfa4a50415a60692e4e8cca0b

  • SHA1

    1ec4d7ae2607533f0476e95c23279d6c97d0ade0

  • SHA256

    fa3d56cbe99e48cf4041a7e70630f60b323cdb15342e342065310d27b245eb3d

  • SHA512

    bb399165bb203b4e16dbff64a2812b9ba9655725f47710ac4e0a9860f49b28fa634d55d84be0b9b53580d029643d18a09434efb10a2abb4cf47335443fe9bc0a

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaac4HKcfw:X6QFElP6n+gJQMOtEvwDpjBsYK6w

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-12_e3a32a3cfa4a50415a60692e4e8cca0b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-12_e3a32a3cfa4a50415a60692e4e8cca0b_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    38KB

    MD5

    84431f5c640708826c9d31e0d1e34124

    SHA1

    473a685fd8c9f4b99b5ad9a93018475ba3ce736b

    SHA256

    d8dbc236229e86e19bba8c41aa7d36306809396c10aaedd5786facd9934f1ef4

    SHA512

    bd378bbe263d3f8ec2f445de3caec2fbfb3eb856c29ce969513d4fa40d0ef1f0ae7d84129f92cc2461c58fe89b4c65cd3f0a4128c90e6f0d62c2ff163a4f21c4

  • memory/3908-17-0x00000000007D0000-0x00000000007D6000-memory.dmp

    Filesize

    24KB

  • memory/3908-19-0x00000000007B0000-0x00000000007B6000-memory.dmp

    Filesize

    24KB

  • memory/4804-0-0x0000000000830000-0x0000000000836000-memory.dmp

    Filesize

    24KB

  • memory/4804-1-0x0000000000830000-0x0000000000836000-memory.dmp

    Filesize

    24KB

  • memory/4804-2-0x0000000000850000-0x0000000000856000-memory.dmp

    Filesize

    24KB