Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/02/2024, 23:29

General

  • Target

    2024-02-21_b32a8deb43a523af9c852dd2242729fc_cryptolocker.exe

  • Size

    128KB

  • MD5

    b32a8deb43a523af9c852dd2242729fc

  • SHA1

    acbd13e3608d77ffe8025f42e06e5905bb2fc21d

  • SHA256

    a73a48b15f7f6bd4e2f065dc73e1f6e3b458c9ff3f7d472886a6bfa51675925a

  • SHA512

    e8eeacaa51f5ff8493e5a86ef2ecc229aeea62214eec0f26809b2dc9fbb9ebc1296f38b3fd5af7f249aed2fd6fe3c7eaab8f7b22ead26a8367bf35f4e505d1c0

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNgp699GNtL1eQ:V6a+pOtEvwDpjtzG

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-21_b32a8deb43a523af9c852dd2242729fc_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-21_b32a8deb43a523af9c852dd2242729fc_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3880
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    128KB

    MD5

    a304a79c9df77e430a07541f3d23557b

    SHA1

    0f1a3190fd081223da3cb25d1732af7d59f99338

    SHA256

    68f1b10412f2f062610d194bdadc6e2a084c84ffde7e00d233500a527e5f7247

    SHA512

    d65f5a59a072a0c4626d35bbf0057ff08d7f07f55aaf7c46363cac3d61bd044bcb8a6c13cccb68458b40f57625dcbe56936ad4d3c11d7c59c90fa3e10f28df58

  • memory/2400-17-0x0000000000760000-0x0000000000766000-memory.dmp

    Filesize

    24KB

  • memory/2400-22-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB

  • memory/3880-0-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB

  • memory/3880-1-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB

  • memory/3880-2-0x0000000000650000-0x0000000000656000-memory.dmp

    Filesize

    24KB