Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-02-2024 13:35

General

  • Target

    2024-02-18_67ee01fe087cb700f2a0007a54a9b521_cryptolocker.exe

  • Size

    42KB

  • MD5

    67ee01fe087cb700f2a0007a54a9b521

  • SHA1

    fe00bbcceda2d4a087450d119bb94deeda026844

  • SHA256

    fd0490df7733f8f1fbec51d15001d61298382a7d140a39016171525615edf953

  • SHA512

    70a649e62ed4be0051c44fb3449c1e316a8c098691b5300f0a8c0b27c051647428558bf595e27f193f2843aec8c77642c85fa8b5427f5b6ddc7b858527878b44

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLaHaMMm2XU:V6QFElP6n+gMQMOtEvwDpjyaHaXe

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-18_67ee01fe087cb700f2a0007a54a9b521_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-18_67ee01fe087cb700f2a0007a54a9b521_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    42KB

    MD5

    061281cb1ef9a2b090a2312c578a2c33

    SHA1

    df954a675ecac68b98e3841cdc3ccfbe1fdff7df

    SHA256

    dcaaf91a45b7632543c11bbbf69dfc317d54465a4d930cf97d58403acdf4dbbd

    SHA512

    faa57a551493fe28d7d0647672644214bc628110d2fa1438e12ba3a18469a54c2c41873893c503329b7222f25e765f8104b3fa178bdac8b37efe9d6aba577a03

  • memory/2268-0-0x00000000006B0000-0x00000000006B6000-memory.dmp

    Filesize

    24KB

  • memory/2268-1-0x00000000006B0000-0x00000000006B6000-memory.dmp

    Filesize

    24KB

  • memory/2268-2-0x00000000006D0000-0x00000000006D6000-memory.dmp

    Filesize

    24KB

  • memory/2560-18-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/2560-17-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB