Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-02-2024 12:48

General

  • Target

    2024-02-17_9bbea1230e5d4c9b95844defeb87104a_cryptolocker.exe

  • Size

    71KB

  • MD5

    9bbea1230e5d4c9b95844defeb87104a

  • SHA1

    f5ff6fab8d81567fe25cf7c893895ed4482f5873

  • SHA256

    19a894f70ce2c90572fa96467d140225100d7beccef1518b56d12f6f65261b4b

  • SHA512

    09a47a7432108b9ee0cab70eb832479d2fc767eeb6e1bf237516bf808e44a24bba81219df6c1b070e48cdd4dff6b83f83284d62bea8bb0b8451ed5e23eb03e06

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1bq:X6a+SOtEvwDpjBZYvQd2e

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-17_9bbea1230e5d4c9b95844defeb87104a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-17_9bbea1230e5d4c9b95844defeb87104a_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4796
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    71KB

    MD5

    11abd740fe6375e22c29ccbf9553f58f

    SHA1

    02fafa1ba2109fb889588e570f3db3c0d14cfa4e

    SHA256

    cbda2307404e43f8cff44913ab9a0e7462c9c4e45b31e653b3538756a73ec262

    SHA512

    e38dbc1d9cc2fea2df6bf3595cdd380b2b58b23b81ca42b4ad008a92b903a0e0d8684e32d911b215e967ff61f561f9eff7472131b12ead4e5bacee2c2749fab5

  • memory/2164-23-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB

  • memory/4796-0-0x0000000000630000-0x0000000000636000-memory.dmp

    Filesize

    24KB

  • memory/4796-1-0x0000000000630000-0x0000000000636000-memory.dmp

    Filesize

    24KB

  • memory/4796-2-0x0000000000650000-0x0000000000656000-memory.dmp

    Filesize

    24KB