Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2024, 15:49

General

  • Target

    2024-03-09_f8a7835cf4b9df490071cf1d10640e42_cryptolocker.exe

  • Size

    38KB

  • MD5

    f8a7835cf4b9df490071cf1d10640e42

  • SHA1

    802af259a9a311456559e65fe64048fc947c76b2

  • SHA256

    23a97b2f79fe112671a156f70e8cec57e5f606a285012b5e62c46e8b7d20df25

  • SHA512

    01b5c9d6590c48bd484ea9126f3e4066d3e684e0ab4a54a3bc65b7842b79e0058edfc4e11bdd427199109272ccf11ddeb38eab90184f891e6bc64fbe5752f01b

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFHu8KQ:X6QFElP6n+gJQMOtEvwDpjBmzDkzQ

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-09_f8a7835cf4b9df490071cf1d10640e42_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-09_f8a7835cf4b9df490071cf1d10640e42_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:812
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4352

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          39KB

          MD5

          b181bda3dff3534af703ca587c4e4290

          SHA1

          78212378f4ac15c96537aa7468c2abd7518b66fc

          SHA256

          16963d49373ad0c10bad5990343ad702a7bc6e7c7d0858da2664b7ef6f9adf8c

          SHA512

          e2b05e36a77d0dac3fd1e7f2a5d0dfaae0be7c3d66e9ff53aa9d54b7e22cb37416dbc88e966ef4994a3225f86ba4e9704a899081d717de76171d8f8f5d74121f

        • memory/812-0-0x0000000002280000-0x0000000002286000-memory.dmp

          Filesize

          24KB

        • memory/812-1-0x0000000002280000-0x0000000002286000-memory.dmp

          Filesize

          24KB

        • memory/812-2-0x0000000002180000-0x0000000002186000-memory.dmp

          Filesize

          24KB

        • memory/4352-17-0x0000000001F70000-0x0000000001F76000-memory.dmp

          Filesize

          24KB

        • memory/4352-20-0x0000000001F50000-0x0000000001F56000-memory.dmp

          Filesize

          24KB