Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/02/2024, 00:31

General

  • Target

    2024-02-25_23cfbdbc93d25294acfde731332df5f8_cryptolocker.exe

  • Size

    70KB

  • MD5

    23cfbdbc93d25294acfde731332df5f8

  • SHA1

    7ffe06b28c4b40262cfeac9fb27dfb5f06a3dbea

  • SHA256

    24b74bf9c7703d884e6fdb43658f091154303fac63936548f2592224f9ea792d

  • SHA512

    5cf00e3d138f4215aab911dd9ba3f0e83530cb34e9c89bf06c77983c5e6c696e36f12755d8581112eff99b5747b6c8fbea4f2b768f113486387139e6076125aa

  • SSDEEP

    1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKUR:DW60sllyWOtEvwDpjwF85f

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 3 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-25_23cfbdbc93d25294acfde731332df5f8_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-25_23cfbdbc93d25294acfde731332df5f8_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    71KB

    MD5

    9b54eb8e3ec0de64d73940907cc2f5f3

    SHA1

    42dac5d6498ae1aa6d4075b9e189b2f85fb6f928

    SHA256

    7a4075306b042a6dd588d39c74f2411679a38adec4d8a462fb6d315630d063c3

    SHA512

    81685374ea28e052bb17e1c35685a69d28d425802b995642b13be8bccb69bbba4e8469d9e79ba37a65597d3f7cddacb9d17a4badfc022fc712d03e93b6a3d110

  • memory/2336-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/2336-1-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/2336-2-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/2336-3-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB

  • memory/2336-17-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/4684-19-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB

  • memory/4684-25-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB