Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2024, 17:43

General

  • Target

    2024-03-05_baff34089f4b20e7f9ed22c746dd1dcd_cryptolocker.exe

  • Size

    118KB

  • MD5

    baff34089f4b20e7f9ed22c746dd1dcd

  • SHA1

    87ddeb37ea847e95c0981941f55f1f4556f6189b

  • SHA256

    2b9428729943f597655575c91aa7649bc66d568038c31c83d27d8c408f02e97e

  • SHA512

    a78af83ad1cd8673ba9dec18e8870c435a54173ccd59486bc24ed9492ca19d6c222bfd28886769845b3a665a952bc60edc5daa90ea8596ce6edf155d7db7849d

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01rBE8:z6a+CdOOtEvwDpjcz1

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-05_baff34089f4b20e7f9ed22c746dd1dcd_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-05_baff34089f4b20e7f9ed22c746dd1dcd_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    118KB

    MD5

    6c0aa21062470924cb31f2f0f641f3be

    SHA1

    77340ecb795e264877649cdbe51eb4bd8ba2e289

    SHA256

    fb0b742b4428504052ad3190e7f7b659ddb8252d7ff32a0ca771644d94d28b83

    SHA512

    c8a4af9c5f050a552d76120514121bbfd0336ed9d1bb94f4e96090a054cdf7dea8f8cc9172d223f905b20ddf7af242dccfea22c8111f1a838a88fc527a6d51c5

  • memory/1868-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1868-1-0x00000000006B0000-0x00000000006B6000-memory.dmp

    Filesize

    24KB

  • memory/1868-2-0x00000000006B0000-0x00000000006B6000-memory.dmp

    Filesize

    24KB

  • memory/1868-3-0x0000000002100000-0x0000000002106000-memory.dmp

    Filesize

    24KB

  • memory/1868-18-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/4400-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/4400-20-0x00000000006D0000-0x00000000006D6000-memory.dmp

    Filesize

    24KB

  • memory/4400-26-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB