Analysis

  • max time kernel
    141s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-02-2024 06:36

General

  • Target

    2024-02-20_5bffbeb2f98333d655a3e96d8812451c_cryptolocker.exe

  • Size

    39KB

  • MD5

    5bffbeb2f98333d655a3e96d8812451c

  • SHA1

    58d17c0c105cd846d2aab753ce869a05118218c2

  • SHA256

    c9a8ef4a0023d076d345be4d20d8e8320189287d99467f3d845cf6c1d6bdfb84

  • SHA512

    3df82b4dc8bd55270094d376aedc89dbc00b7b6ebd3a1c6424ba7974e84e56f44752fff76694c63313d92413ca9e8555f772c0d92bb950934f608fc831e21fa2

  • SSDEEP

    768:wHGGaSawqnwjRQ6ESlmFOsPoOdQtOOtEvwDpjm6WaJIOc+UPPEkL/5:YGzl5wjRQBBOsP1QMOtEvwDpjgarrkLx

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 3 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-20_5bffbeb2f98333d655a3e96d8812451c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-20_5bffbeb2f98333d655a3e96d8812451c_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:564
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    39KB

    MD5

    c75611dcd8941394ab99bb69e6fd3b13

    SHA1

    17f464ff0e387740bf0040eeb1bdaa9ec562ab1d

    SHA256

    5672faae1e7efb0bd294f53dd6879a5d0ed1407ff6cd8796e7eaa9650c0a3694

    SHA512

    2dfca3e4b33c7a2293b244bac60b5e16f4452f24fbd5714c4d2bf84ac4c74da6e03cc4abfe08c4ac9a8c46f110998699fec8ee6aa3b4246cce5416aa6b1718ac

  • memory/564-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/564-1-0x00000000007B0000-0x00000000007B6000-memory.dmp

    Filesize

    24KB

  • memory/564-2-0x00000000007B0000-0x00000000007B6000-memory.dmp

    Filesize

    24KB

  • memory/564-3-0x00000000007D0000-0x00000000007D6000-memory.dmp

    Filesize

    24KB

  • memory/564-17-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/3000-19-0x0000000000750000-0x0000000000756000-memory.dmp

    Filesize

    24KB

  • memory/3000-20-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB