Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/02/2024, 21:32

General

  • Target

    2024-02-22_7d01996dbbe0aff236aa4d6ac0e15600_cryptolocker.exe

  • Size

    48KB

  • MD5

    7d01996dbbe0aff236aa4d6ac0e15600

  • SHA1

    6257d3ec42470ce4344a4451d00d5d67710e92df

  • SHA256

    f8fb46d6c42f5dbb7bcb0ff540c593116d4ec93ed3eb6c8c02898ae6cf22b0b9

  • SHA512

    67252abbd0005f65827b1eb130fc1fbf4a53feb963f641c4c3a7a0e9c6738c6edccd55fa8f7d17ac45940db1bf6c57058bafaeac62ce4be8b59f6b094eb79dc0

  • SSDEEP

    768:79inqyNR/QtOOtEvwDpjBK/rJ+Nw8qnUCX:79mqyNhQMOtEvwDpjBxe8xCX

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 3 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-22_7d01996dbbe0aff236aa4d6ac0e15600_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-22_7d01996dbbe0aff236aa4d6ac0e15600_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4820
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    49KB

    MD5

    ac2194f031d65846b8a26ae03b8ad2d1

    SHA1

    212df1f8b908d95690399d71ce2740ef5b3981f3

    SHA256

    9d38de6c444e405c828e9dbac84540d8775452d704563d1d33637b201534b356

    SHA512

    52b74a257d017dc797517cc6821d008fb11c327760945a8e7859cb6c0c3a69278fa40164c74fa4f2d0a0d62b37dc116aed114252252d5855cdbf3e3ad75ed566

  • memory/400-19-0x0000000002090000-0x0000000002096000-memory.dmp

    Filesize

    24KB

  • memory/400-21-0x0000000001F20000-0x0000000001F26000-memory.dmp

    Filesize

    24KB

  • memory/4820-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/4820-1-0x0000000002310000-0x0000000002316000-memory.dmp

    Filesize

    24KB

  • memory/4820-2-0x0000000002310000-0x0000000002316000-memory.dmp

    Filesize

    24KB

  • memory/4820-3-0x0000000002220000-0x0000000002226000-memory.dmp

    Filesize

    24KB

  • memory/4820-18-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB