Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2024, 16:44

General

  • Target

    2024-03-05_2abd82b8ab38009133eaa7152a8ca526_cryptolocker.exe

  • Size

    46KB

  • MD5

    2abd82b8ab38009133eaa7152a8ca526

  • SHA1

    21cd60800c62e4af8a9ff3eac41d06f77a6270c7

  • SHA256

    8fb7d7ef007bfe072a643b0cfa64284675eb02fb6625fce29e9944af41647705

  • SHA512

    595c8e08505101bc23d5634d50bcabfdee25bd7cd4baf324f614d767d4054e29d51b54def64cbac925417c659abb8ea0aae9943e82e13f9ec56d5a5b98677a94

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB+:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6U

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-05_2abd82b8ab38009133eaa7152a8ca526_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-05_2abd82b8ab38009133eaa7152a8ca526_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    47KB

    MD5

    8e6d35c3edb3a59d2dc182dd7bb7d206

    SHA1

    da7b66eaa46451972f446a4c8a2b61cbd8a9829a

    SHA256

    cd3196d826d1f7a0e43ce2510102d33c0594391aefe6e56c2c4244a4eca26dae

    SHA512

    e456c1b43a752e09f1b59ff4afeb38806d1b9e76e207f69f7af41ac1da7cf9ca617b9b3b99372eeed6c4a9b53defd3ad182a4d5f46d3a4dc95493c285c0a2cc0

  • memory/4472-18-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/4472-20-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/4472-23-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/4472-27-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/5056-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/5056-1-0x00000000021B0000-0x00000000021B6000-memory.dmp

    Filesize

    24KB

  • memory/5056-2-0x00000000021B0000-0x00000000021B6000-memory.dmp

    Filesize

    24KB

  • memory/5056-3-0x0000000000630000-0x0000000000636000-memory.dmp

    Filesize

    24KB

  • memory/5056-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB