Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/02/2024, 06:09

General

  • Target

    2024-02-20_c885e3528c6adfc2e444b72a69dc7188_cryptolocker.exe

  • Size

    72KB

  • MD5

    c885e3528c6adfc2e444b72a69dc7188

  • SHA1

    89879ab4ba3b7fc4552d71565dc445b7115be793

  • SHA256

    8c8bca088ad6cb8189ab3473f230795caf2aacf25f61c59a39cff15928481c1e

  • SHA512

    149f3e33402446f2f1c2a83d0d1e628e5353c6a2e0c2c0b01a617cf8b0fedf6dd6b72e8c6ba5dbfdd74415ac64f1d0b00951ec183a46591a9bb45074776bd7ad

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1UG:X6a+SOtEvwDpjBZYvQd2B

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-20_c885e3528c6adfc2e444b72a69dc7188_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-20_c885e3528c6adfc2e444b72a69dc7188_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3504
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    72KB

    MD5

    21d894644014c2f5a1490a3e0eade998

    SHA1

    e536993d625d443ac207a7ca4ceae978fd7abb63

    SHA256

    4601933eb50d24ed686e428a11a4d2b8cffef2823d29f5884aa3966bdc65a5f6

    SHA512

    813046dc65c95b39960e7ababa8b5c13fb6e2b32df199acccab6e8e76ec16830719b061ffa69ff46a9c4157fcdd56d07ce244d7d9b2168b1e307087ab1a8e1f9

  • memory/3504-0-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/3504-1-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/3504-2-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB