Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/02/2024, 20:27

General

  • Target

    2024-02-23_0c9beaea5252913bbcca6586394df56a_cryptolocker.exe

  • Size

    98KB

  • MD5

    0c9beaea5252913bbcca6586394df56a

  • SHA1

    9138d14bcb061e9cdcd9599d56ac8cc9dadf279c

  • SHA256

    44b82bf7616d26c686962c4492dc05815fbba99b9e80b5a904f04b768da68390

  • SHA512

    53a9d60f6c17475911fc8d5c489442510b3080a9490bd940f99607a9b13b1ff92a1d3c4b0e39d3a7397ed9eaea7812a7458a0e93c845f02a8d5b649757288534

  • SSDEEP

    1536:26QFElP6n+gBQMOtEvwDpjQGYQbN/PKwNCWnh:26a+2OtEvwDpjtzP

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-23_0c9beaea5252913bbcca6586394df56a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-23_0c9beaea5252913bbcca6586394df56a_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:848
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    99KB

    MD5

    a4e27234480432b745567936dca1754f

    SHA1

    c58b2643ef712e6e37126442ee1cf0658179129a

    SHA256

    d4ba5ad921285bc08255d9e058cb97f8b46b1f27f267985bc9ac797b8b694205

    SHA512

    802ae101bbe79b951114de188d8ca99e4d5738bff5ffe54c98a2f76f14f79e76995b4d086b36fb2ad63c1876ece7a1a553840ae6760040ed3eddbe19d61869e2

  • memory/848-0-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/848-1-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/848-2-0x0000000002070000-0x0000000002076000-memory.dmp

    Filesize

    24KB

  • memory/3700-17-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB

  • memory/3700-18-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB