Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/02/2024, 19:29

General

  • Target

    2024-02-23_1965cd5f105a4607a87fdbb63073e3f7_cryptolocker.exe

  • Size

    61KB

  • MD5

    1965cd5f105a4607a87fdbb63073e3f7

  • SHA1

    2375552e6c78b90fda092c08d5bd2fe5dc35a71b

  • SHA256

    f417a81402a0d9bd2b999ee40d5bfc834fbaf046fdf3ab0a71323a8a860136dd

  • SHA512

    aa488715317d3d4545b22c8d31103e5f5f4b692c032edb28cb76597eedaf2c24a03dd401f5dc7f4e8f37024153ff5c703e23d589b753762d979baf20523ef519

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBccD2RuoNmuBLZ/xEm:X6a+SOtEvwDpjBrOn

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-23_1965cd5f105a4607a87fdbb63073e3f7_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-23_1965cd5f105a4607a87fdbb63073e3f7_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4340

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          61KB

          MD5

          ec4042632226dc701866b8dc67a18590

          SHA1

          a4af449de210a93aae139fc560c12d46ed80d560

          SHA256

          995e7be16ae90f9769f9faf9ee58467a141b93e999902d8a63aaa977b3ba0ea5

          SHA512

          b5493e08b1a4e7924fce83e04a6b79e4201435140c7162512548cf83a693a6ddd8a8bcfea629ec60a6169829453dec5e5c3b54d6c3d68cdc4e40e42b8f813107

        • memory/2972-0-0x0000000002190000-0x0000000002196000-memory.dmp

          Filesize

          24KB

        • memory/2972-1-0x0000000002190000-0x0000000002196000-memory.dmp

          Filesize

          24KB

        • memory/2972-2-0x00000000021C0000-0x00000000021C6000-memory.dmp

          Filesize

          24KB

        • memory/4340-19-0x0000000000840000-0x0000000000846000-memory.dmp

          Filesize

          24KB

        • memory/4340-17-0x0000000000860000-0x0000000000866000-memory.dmp

          Filesize

          24KB