Analysis

  • max time kernel
    146s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2024, 06:34

General

  • Target

    2024-03-06_c62887970971e4dc35005e96a634eab3_cryptolocker.exe

  • Size

    72KB

  • MD5

    c62887970971e4dc35005e96a634eab3

  • SHA1

    0c27ee52e0437380108e98dcb5a00b7460a35c1b

  • SHA256

    1a23de75ff7f1c7006f06b667fcead5149670e787143d3d86c4eba6a6c748a88

  • SHA512

    c69a341787391338b41584a258fc70c20988f6bf5ac48b29964639a4369ead5f40b35e93987ede3d668caab566ceaa36628d95dafe3ab8381c20297da4e87fd3

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1sc:X6a+SOtEvwDpjBZYvQd2v

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-06_c62887970971e4dc35005e96a634eab3_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-06_c62887970971e4dc35005e96a634eab3_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4072
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3808 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1168

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\asih.exe

      Filesize

      72KB

      MD5

      1e249dd8d479dd38d9891c70ec392ccb

      SHA1

      4aa98b43be7f659308c9cc1ec49def197c68b546

      SHA256

      de3c07d6d846181e2a6fdaf2cdbca22212b28eecb0e733138e934fbb87dca0c2

      SHA512

      69148273ccf0ba3b048cab8ee8b678f7a6a87b1343a9b244aba84383883cd155dd99e0b19cca84c5215566bddc5c64167a06a14eef1c1e2bc28ddc37ca390ace

    • memory/1960-0-0x00000000007F0000-0x00000000007F6000-memory.dmp

      Filesize

      24KB

    • memory/1960-1-0x00000000007F0000-0x00000000007F6000-memory.dmp

      Filesize

      24KB

    • memory/1960-2-0x00000000021B0000-0x00000000021B6000-memory.dmp

      Filesize

      24KB

    • memory/4072-17-0x0000000002070000-0x0000000002076000-memory.dmp

      Filesize

      24KB

    • memory/4072-23-0x0000000002050000-0x0000000002056000-memory.dmp

      Filesize

      24KB