Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-02-2024 10:02

General

  • Target

    2024-02-18_b6eb6111d5adc67ede527ff85e7bb23b_cryptolocker.exe

  • Size

    37KB

  • MD5

    b6eb6111d5adc67ede527ff85e7bb23b

  • SHA1

    3174799ade736764fc5029f3b378d3a400d785c5

  • SHA256

    ec5b02d9070232ec4df8d7d40882f023d25c5a435f96c4d5cd5e03c11966073f

  • SHA512

    a9b95f5bacf151bd443681bf2dd78cbb6bf19a1e66bc7d38859e218752d6b5e5ed968eb0a06618600bb5a43a4bb060602590e98ba1ba16a49f06683cab20e486

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5axZ:V6QFElP6n+gMQMOtEvwDpjyaYa/

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-18_b6eb6111d5adc67ede527ff85e7bb23b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-18_b6eb6111d5adc67ede527ff85e7bb23b_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4836
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    37KB

    MD5

    de6e2d8845f67041f5358e55440b653b

    SHA1

    ea0f1343efeea5a23c162cce01994666407cc122

    SHA256

    7c33560ce9d7583d93ef6582a6ecc542eae1660563ea495f06f47d18351862b7

    SHA512

    5552c70b21c10c02801eab96d0de28654ec18e5d05fb11a7391e9810fe70d0bfa5a555dfc35c1c4d14096961b4a9776a5a3998e34955a484eccfcbcbbd8855da

  • memory/3732-17-0x00000000006E0000-0x00000000006E6000-memory.dmp

    Filesize

    24KB

  • memory/3732-23-0x0000000000490000-0x0000000000496000-memory.dmp

    Filesize

    24KB

  • memory/4836-0-0x00000000020D0000-0x00000000020D6000-memory.dmp

    Filesize

    24KB

  • memory/4836-1-0x00000000020D0000-0x00000000020D6000-memory.dmp

    Filesize

    24KB

  • memory/4836-2-0x0000000002100000-0x0000000002106000-memory.dmp

    Filesize

    24KB