Analysis

  • max time kernel
    137s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/02/2024, 08:32

General

  • Target

    2024-02-18_43d564df63c962392849a71bf4dcf5d0_cryptolocker.exe

  • Size

    52KB

  • MD5

    43d564df63c962392849a71bf4dcf5d0

  • SHA1

    7b7b33128305cb2d799f8021ab2bdbf3b2483b59

  • SHA256

    a216f2b1bfb8feab528d608bdd8a26f5ff039d6376e2e8e857ed5f91c665885c

  • SHA512

    428f8bc1a427d6b93dd72ac2c6f55b45efaedc927749759b41af6af93857b64f0501fe6886aac8c0f1f124902e62ed5e8202ecbeb7fcb61a108612d1fc541ec5

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjeJQ7pojaklrH:V6a+pOtEvwDpjU

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-18_43d564df63c962392849a71bf4dcf5d0_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-18_43d564df63c962392849a71bf4dcf5d0_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1932

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          52KB

          MD5

          16a266e55395a64900191928de90c271

          SHA1

          7aac7b2d53df68c908ae2b535d67a1676172ec50

          SHA256

          bf0ad17f404e5abc17f400678b3d83d91fcc37577fadca99b3a23e1a90885293

          SHA512

          54d3882d5d07739e91d83eb4ba7226204c882e24b2a90e004f9952cc5be73e7c7398bbbd3d0f775aa410d7854307016a98f51a659aab7679e7115d3407f6e35b

        • memory/792-0-0x00000000006A0000-0x00000000006A6000-memory.dmp

          Filesize

          24KB

        • memory/792-1-0x00000000006A0000-0x00000000006A6000-memory.dmp

          Filesize

          24KB

        • memory/792-2-0x00000000007D0000-0x00000000007D6000-memory.dmp

          Filesize

          24KB

        • memory/1932-17-0x00000000020F0000-0x00000000020F6000-memory.dmp

          Filesize

          24KB

        • memory/1932-23-0x00000000020D0000-0x00000000020D6000-memory.dmp

          Filesize

          24KB