Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/02/2024, 16:46

General

  • Target

    2024-02-14_c96de41ea40e0201c8763ea19adb19d2_cryptolocker.exe

  • Size

    47KB

  • MD5

    c96de41ea40e0201c8763ea19adb19d2

  • SHA1

    261ce028ed4e8c8104cce4afe88cecb755f5a0ac

  • SHA256

    92c52003e3f3476c3ba1fa0499586c26ecdb7ce26c64f5ddd931a67b1bb2ddd0

  • SHA512

    f4758c391df0621045b50a1da08bd59744e086f7dce27ab2bfafd8abd5dc46a821a82c419b0877c6c69370948f842a6be0d85492c253fe91facfb13a1d419378

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3wwsr0j:X6QFElP6n+gJQMOtEvwDpjBDg

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-14_c96de41ea40e0201c8763ea19adb19d2_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-14_c96de41ea40e0201c8763ea19adb19d2_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3764
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1412

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          47KB

          MD5

          e3eba6bd78ab8e4a6ae5cd440a632562

          SHA1

          303c503cd780227c41b0ae818751c2f793d0b483

          SHA256

          56836cc870efb1166b083731d6b90b0affecef32ddc6457e84d1e4caaaff52d7

          SHA512

          308263b8c1774c34241c1c7fa2367d146e4d2c34f76fd78d4d51ed73ff12f78c8b9e38f61558a46671f6affa5f4d37c18c274752c5733d8d35da8efcf1b336d9

        • memory/1412-19-0x0000000000490000-0x0000000000496000-memory.dmp

          Filesize

          24KB

        • memory/1412-17-0x00000000004C0000-0x00000000004C6000-memory.dmp

          Filesize

          24KB

        • memory/3764-1-0x00000000005F0000-0x00000000005F6000-memory.dmp

          Filesize

          24KB

        • memory/3764-0-0x00000000005F0000-0x00000000005F6000-memory.dmp

          Filesize

          24KB

        • memory/3764-2-0x0000000000610000-0x0000000000616000-memory.dmp

          Filesize

          24KB