Analysis

  • max time kernel
    142s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-02-2024 17:51

General

  • Target

    2024-02-21_6045e6c4b40822048c6691ec72807add_cryptolocker.exe

  • Size

    94KB

  • MD5

    6045e6c4b40822048c6691ec72807add

  • SHA1

    61725519e6d906ed501644603fe67614e1dead3e

  • SHA256

    6d2885de2706d151066029846586e0824bd1b2cc285bbb0b0ae7fed5ce5ffe77

  • SHA512

    7fe45a35b19cc983cd98cfd7b91cfe2d11b25d48fb8102cbc13bec2d2133252ad674c6fc226a02e78026a167e5fd49d671ad426a50789b509356c3f3d700a774

  • SSDEEP

    1536:Z6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNC4w28:Z6a+pOtEvwDpjtz4

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-21_6045e6c4b40822048c6691ec72807add_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-21_6045e6c4b40822048c6691ec72807add_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4204
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    94KB

    MD5

    c778e79e2dc1c19af4a7706ff6d51d43

    SHA1

    5f09561b32a4af201a88568189e5abe18a20f21e

    SHA256

    b8a7b08c697e6bfab316c071b83154fe7203c2ad6ebb3ff7b89681bdb1e08ad2

    SHA512

    8bbf7303a2783b8492feae58e29502bc03b6d4308ee32ff07e49f7a0d7e3e3d99ff6dc08d533856dd21d13cf9d3feae121b6a6cbaf37c423a18520bbb33a7f02

  • memory/4204-0-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/4204-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/4204-2-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB