Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/02/2024, 06:10

General

  • Target

    2024-02-25_e93dbae28098f82eb28c13525a9091a1_cryptolocker.exe

  • Size

    47KB

  • MD5

    e93dbae28098f82eb28c13525a9091a1

  • SHA1

    807c9d9b090c24e24218d5478ed423c0c423ddf4

  • SHA256

    32b90b6485e9f7519388115d6dcd33f9d857f3d9b9ee104e6e3545c0891dd596

  • SHA512

    b4468f4ed1410336df18443cef197bf38649b1ce5ddb0d57e440f5e1dfe1138b01a2974035691c845128fe0575f92021c5e6dbb6379a969cc39e3958a0dd13fe

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpjeJQ7suIlsw92KFXckdpv6:V6QFElP6n+gMQMOtEvwDpjeJQ7pojakm

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-25_e93dbae28098f82eb28c13525a9091a1_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-25_e93dbae28098f82eb28c13525a9091a1_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2232

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          47KB

          MD5

          601794b66dfb8c3c08a279650186f223

          SHA1

          0f3e4bd6e7d056175b46bb90a8aca525be1cc94b

          SHA256

          6cac30564087985b40f042e68c0a5cb0988c00b1eda4388b135b1296db79cd5c

          SHA512

          6751f251c0e6de78c0dfa9cd6d3774794598241169f03bb8c5c35ce9ad85d3168a1dd14684e9855ba0b93e3f5c6dfa15d58c00fa3174cde4087001e13f8248d3

        • memory/2232-18-0x0000000000520000-0x0000000000526000-memory.dmp

          Filesize

          24KB

        • memory/2232-17-0x00000000006C0000-0x00000000006C6000-memory.dmp

          Filesize

          24KB

        • memory/2672-0-0x00000000007B0000-0x00000000007B6000-memory.dmp

          Filesize

          24KB

        • memory/2672-1-0x00000000007B0000-0x00000000007B6000-memory.dmp

          Filesize

          24KB

        • memory/2672-2-0x00000000007D0000-0x00000000007D6000-memory.dmp

          Filesize

          24KB