Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/02/2024, 07:47

General

  • Target

    2024-02-17_acc732efacec7f6770e2fcd8fb5fa794_cryptolocker.exe

  • Size

    69KB

  • MD5

    acc732efacec7f6770e2fcd8fb5fa794

  • SHA1

    bb913f233c096f7cbaad08f29f29cb10b0e4b35e

  • SHA256

    ae18bf19e8f91be102de67596d41152c80fb47e46bd02926570f51d0f65e5253

  • SHA512

    90bd6e51002373b9aa61765a385da4c2457e13d4506393754da0105051866a3a0dc848b3508fd96000a4c3ad582d99fe9c122abe3060de736943a75f293413a6

  • SSDEEP

    1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKUNZOui:DW60sllyWOtEvwDpjwF85U

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-17_acc732efacec7f6770e2fcd8fb5fa794_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-17_acc732efacec7f6770e2fcd8fb5fa794_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4944
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    70KB

    MD5

    266e4b46536afa63a56986d7532d95fa

    SHA1

    8c05e14cae48194f0848f1483f44d7d81e99007f

    SHA256

    43e028863aae813a921ceece7c3e15eccfd12b428626c14dbdb0fd5fca45978b

    SHA512

    21d4bfb7ef87d76604a2deb832f5511a4b7cd6d1e6f8b8f1deee43648d7af755749eb6be0083b9ed5df5fff33f2824fb39eeaef82b4c835b7887cf05a9bfe8cc

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    64KB

    MD5

    bb4cefe1d5261b45df29c0fe2b61b3e4

    SHA1

    446f2bb8261934ef2e9fa583afa12e32e2312cc6

    SHA256

    e30b6b18b96731df84b3ba46cb763ec035c21d2a141c3252c712aa099768fadf

    SHA512

    3abe25a14951083b589084b8e132b2d21591a49ceb8a0d1118b50e94e25c0f190827c1a31fae48845c87b436608505f3573388cbef9a3132ad37328e7afeffac

  • memory/4524-19-0x0000000000650000-0x0000000000656000-memory.dmp

    Filesize

    24KB

  • memory/4524-21-0x0000000000630000-0x0000000000636000-memory.dmp

    Filesize

    24KB

  • memory/4944-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/4944-1-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/4944-2-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/4944-3-0x00000000007D0000-0x00000000007D6000-memory.dmp

    Filesize

    24KB

  • memory/4944-17-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB