Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-02-2024 00:22

General

  • Target

    2024-02-21_55b7598c7a60f53008a1e3fc9da432b5_cryptolocker.exe

  • Size

    48KB

  • MD5

    55b7598c7a60f53008a1e3fc9da432b5

  • SHA1

    98c9882b7c56bb211ae3f40d8172f6d0c50d135e

  • SHA256

    4ea24c81b1f711a9b81d03f2dc7b3c16bf5ccec57e882a2ccfc9cdaf54c0a9fc

  • SHA512

    9bc16bf5f8af22f2d728b0fea5529ddba3e308e62cf6271837fd1b2d0151d0d87d277990dc130d39dc3aad6f97b6a939263877aab8c62120affeecad4c81dde8

  • SSDEEP

    768:79inqyNR/QtOOtEvwDpjBK/rJ+Nw8qnTaF:79mqyNhQMOtEvwDpjBxe8LF

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-21_55b7598c7a60f53008a1e3fc9da432b5_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-21_55b7598c7a60f53008a1e3fc9da432b5_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4192
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    48KB

    MD5

    0653e5fcc203bbbb4cd63843826a0500

    SHA1

    20ca3e7da9b52a54eb325b8800c578d7e5ca8d38

    SHA256

    3009ad00eaa77e729968893996cffc781bb9ab85c52a7bcb6c84ca0bf83bc147

    SHA512

    74f964a9bf8a86ad5b7db57afdbd4c28f335f1c1e503ccec6d9888314e04ba0dd15b7be668acab8d2321bd1143452f1dc1fb50ebf11020db0fefde23f5260845

  • memory/916-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/916-22-0x0000000001F60000-0x0000000001F66000-memory.dmp

    Filesize

    24KB

  • memory/916-20-0x0000000001F80000-0x0000000001F86000-memory.dmp

    Filesize

    24KB

  • memory/4192-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/4192-1-0x0000000002310000-0x0000000002316000-memory.dmp

    Filesize

    24KB

  • memory/4192-2-0x0000000002310000-0x0000000002316000-memory.dmp

    Filesize

    24KB

  • memory/4192-3-0x0000000002230000-0x0000000002236000-memory.dmp

    Filesize

    24KB

  • memory/4192-18-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB