Analysis

  • max time kernel
    142s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/02/2024, 14:54

General

  • Target

    2024-02-18_f4917d6e986bb9cb7bd39c2c0b92dcc6_cryptolocker.exe

  • Size

    54KB

  • MD5

    f4917d6e986bb9cb7bd39c2c0b92dcc6

  • SHA1

    915b3e91c773777690c3be944fa7fbeb0921a8aa

  • SHA256

    2eb6627ff0b9aba31c77e62d58f15744fe23578b10ef13efdda8c8395e7f852c

  • SHA512

    81be055b1cfdb31bfbcf2d9fc6a3b4b28dae78f16652f95cea29f115d1588c0c22269ff7169786e474bec21d3ba74af85cd8a838c26e9910604a853f0e6b13b4

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjyaLccCGXlDd5:V6a+pOtEvwDpjvDN

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-18_f4917d6e986bb9cb7bd39c2c0b92dcc6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-18_f4917d6e986bb9cb7bd39c2c0b92dcc6_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:636
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1016

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          54KB

          MD5

          eb4676c55b77ed8e2e4e962ae6731058

          SHA1

          e1358be7a23ee136e81e681426edd8c0e8ccbbce

          SHA256

          922bb8d3463effaac35a3b3373b08c2e1b8667c17df4cee7aaab3328c442231f

          SHA512

          881f9536c7c06cef6a23d97919a5d9a7e4ba368c75610092475f82bfcbd40d7eec8ac18f214a5cc99645e3b98afd4eef8a2877360dee0f3780381a64975ffa20

        • memory/636-0-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/636-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/636-2-0x00000000004F0000-0x00000000004F6000-memory.dmp

          Filesize

          24KB

        • memory/1016-18-0x00000000005A0000-0x00000000005A6000-memory.dmp

          Filesize

          24KB

        • memory/1016-17-0x00000000005C0000-0x00000000005C6000-memory.dmp

          Filesize

          24KB