Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/02/2024, 20:52

General

  • Target

    2024-02-18_c6ea800f5d685088a20c5fac329cf871_cryptolocker.exe

  • Size

    36KB

  • MD5

    c6ea800f5d685088a20c5fac329cf871

  • SHA1

    23c3296d2053d045507d6db93bddefc7fe232330

  • SHA256

    de265a5afa7019af8946220b5576ba5a5b0548c737f67284209aee3740c121b6

  • SHA512

    949783ef74bdb5805bfc455c08a66026b7e6b454d9385f4ff31693b8c872c5bb3867ba645225d6b2d79af65da3550ab67f2a8747a8da4b3f43cdfd2b7f76a2f6

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVajSKm5uhy7O4qqZ:X6QFElP6n+gJQMOtEvwDpjBcSKm5uhw5

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-18_c6ea800f5d685088a20c5fac329cf871_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-18_c6ea800f5d685088a20c5fac329cf871_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:436
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:5096

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          36KB

          MD5

          cb847c5766ee6df56ee2840bbaa33cc1

          SHA1

          b9f89e253427ca5b71a81f079575e04899131a33

          SHA256

          9a9dd1aeadb69d54c084007ed615fe806c01f0c9d348064095ec9b58dcd91247

          SHA512

          e1efee906f894d33244e6a24ce7f539e876fa1207f1ac6b3bf38b0971e0964caaba56fee007485ce1baae7e2db64b9cc57ed4470131b619ef3b49339c30b1d3b

        • memory/436-0-0x0000000000520000-0x0000000000526000-memory.dmp

          Filesize

          24KB

        • memory/436-1-0x0000000000520000-0x0000000000526000-memory.dmp

          Filesize

          24KB

        • memory/436-2-0x0000000000640000-0x0000000000646000-memory.dmp

          Filesize

          24KB

        • memory/5096-17-0x0000000000860000-0x0000000000866000-memory.dmp

          Filesize

          24KB

        • memory/5096-19-0x0000000000840000-0x0000000000846000-memory.dmp

          Filesize

          24KB