Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2024, 05:13

General

  • Target

    2024-02-24_c8f15b517b15738628c740b70c70d799_cryptolocker.exe

  • Size

    48KB

  • MD5

    c8f15b517b15738628c740b70c70d799

  • SHA1

    46ac21d6145d861dc02b00277bfd4236ebc7908c

  • SHA256

    387e80feed59c6269d9fcf9d5e0b32327d0fe170ea1ca69bf3ffd2ca66f3df32

  • SHA512

    9a31ed3234965f611263b2c14d059d7e682e3cfb8ee697e77d46146210b91ce113262720f6cd7b41d97de8a55450392ce612f731b8094308bdaf702a5efdb545

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu55id3AMWZRQK:X6QFElP6n+gJQMOtEvwDpjB0GIWiWLB

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-24_c8f15b517b15738628c740b70c70d799_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-24_c8f15b517b15738628c740b70c70d799_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4392
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    49KB

    MD5

    871f9e6e49162cc9710d15bcb1879330

    SHA1

    f8b4992e56d6c4f51b37cd30acef10fcbe3ccd6c

    SHA256

    f954b65e84414985093448f967e2b3666e0028f0653da8960bd860bbada12385

    SHA512

    d905618a8a63426e4dc33d62a4611a188693204b426dee72a63455cd790ab3107fc0547afab324f65ff3f8b0c7f735c75c22ed355e7b23b3d3e3ed47dd24fe4c

  • memory/2020-17-0x0000000000690000-0x0000000000696000-memory.dmp

    Filesize

    24KB

  • memory/2020-23-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB

  • memory/4392-0-0x00000000005F0000-0x00000000005F6000-memory.dmp

    Filesize

    24KB

  • memory/4392-1-0x00000000005F0000-0x00000000005F6000-memory.dmp

    Filesize

    24KB

  • memory/4392-2-0x0000000002230000-0x0000000002236000-memory.dmp

    Filesize

    24KB