Analysis

  • max time kernel
    143s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-02-2024 02:45

General

  • Target

    2024-02-25_ba504d1aef112af7be77060d5386f37e_cryptolocker.exe

  • Size

    39KB

  • MD5

    ba504d1aef112af7be77060d5386f37e

  • SHA1

    8ae821ce54349cfab5442d9588bb55ed47fd001d

  • SHA256

    4451611b7da1bc883789f4f952f2a8b04fe15bc4792aaa6ca479db2df1c65133

  • SHA512

    8f9da5f8f01fec98387d20c23928e63153c82c7b7ba7969e2905a6b1cb13c282e2d54fe77c47d2e9bb46746db10e01bf3c6493211a2d7b7379781ad990082c7b

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5axRVZBL:V6QFElP6n+gMQMOtEvwDpjyaYaLBL

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-25_ba504d1aef112af7be77060d5386f37e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-25_ba504d1aef112af7be77060d5386f37e_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:824
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    39KB

    MD5

    28d2c68742d8847aaf30c05fc364cbb8

    SHA1

    ee501aac2fedbae42d2bf5186600c819c522b41f

    SHA256

    b614730c8c8dfc87bd7198762ad105c3041c0c78187bfc2aaa2aad9e61904cba

    SHA512

    474f3d006166f98c75891e4bd6ac8daac302675eb14ef9e35c7057d7515a9a9046d2b141066e9daa51dcef21ba2ed458e2fc5655ade41d9a0fd21240d3148574

  • memory/824-0-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/824-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/824-2-0x00000000006E0000-0x00000000006E6000-memory.dmp

    Filesize

    24KB

  • memory/3864-17-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB

  • memory/3864-21-0x0000000000640000-0x0000000000646000-memory.dmp

    Filesize

    24KB