Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2024, 19:33

General

  • Target

    2024-02-24_5881d6c01019384cef9a5998df5f3606_cryptolocker.exe

  • Size

    40KB

  • MD5

    5881d6c01019384cef9a5998df5f3606

  • SHA1

    0c7e3ac8a13b84e68c19165826e6180d1caa3a71

  • SHA256

    623db906ef9aa665a96ce4698bb0771076a00a28088efacdc53c75822204d9e9

  • SHA512

    635768992c916cf1249090f69c30f7dca56a7df44640f9bf3007c87b7166a19ee42c2e2bb7fc17709d7228a61c439a37656deb9e2dd2ebf8432163c6acbc3294

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpjeJQLI3JnoehFORqLqJ:V6QFElP6n+gMQMOtEvwDpjeJQy1hoRqM

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-24_5881d6c01019384cef9a5998df5f3606_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-24_5881d6c01019384cef9a5998df5f3606_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    40KB

    MD5

    f69ad9ad1f65e44d5f821edf7bda9361

    SHA1

    c3df05ec7e39a6d5a379c3cc7277f4a2000524ff

    SHA256

    3e8bb9428ebb20de3f3acc3889319aaa5d1e3831ad49832398efb4d56eefae23

    SHA512

    82879be25dd96225912cc6571018b00cf78d77c1a97b25f0a1ada2dded039a437b73ac5d16ff449f5543cf734a102307ed6ab5d53f2cc354218b8191503fc36e

  • memory/1876-0-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1876-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1876-2-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB