Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/02/2024, 11:58

General

  • Target

    2024-02-18_bc449736885ca23802fbfebec9cfd4ca_cryptolocker.exe

  • Size

    69KB

  • MD5

    bc449736885ca23802fbfebec9cfd4ca

  • SHA1

    91227b65428867e908b9223b8c401f41025169d1

  • SHA256

    725e6c42e96b4e79bd519d277e0e196e4015357abe90211efb0510adc6402032

  • SHA512

    9cea6de6789407ddaa1cc70fb6a5033134b13cd0d949cf08ee2715a24de03e208be0f8d3e0311d40b78b24d1e90175821b322b18bd09f809a84ec30f8acd84b7

  • SSDEEP

    1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKUYB:DW60sllyWOtEvwDpjwF85O

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 3 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-18_bc449736885ca23802fbfebec9cfd4ca_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-18_bc449736885ca23802fbfebec9cfd4ca_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:64
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4064

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          69KB

          MD5

          8fac56d99e1cec2df668d0985dd90071

          SHA1

          9cc58cdfe5cb59c9fa85e8555dc90db40898396c

          SHA256

          6fe38b12a4a283f8b0f36ded97ff1ffc3fa755a73548f480e2b65686d44227fb

          SHA512

          8d4d2c366ebb5898709de18c9b253976eac5168804a36955f246e7196857ab65321cc855a095727defd90074897f13632444dea2b9013545c2c0095b2a2ceec0

        • memory/64-0-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB

        • memory/64-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/64-2-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/64-3-0x00000000004F0000-0x00000000004F6000-memory.dmp

          Filesize

          24KB

        • memory/64-17-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB