Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-03-2024 22:25

General

  • Target

    2024-03-10_e5bdbee3e0bd3d7737cd185e23402874_cryptolocker.exe

  • Size

    96KB

  • MD5

    e5bdbee3e0bd3d7737cd185e23402874

  • SHA1

    fc962060ff68a0d1e9e700b118578fb1eadc09ac

  • SHA256

    df4942d0882797c920d009a90d7cbd424916e68d687e5ff13b9394b79391886b

  • SHA512

    23a967454f6fbfb26269df92ab1b4cbc8fbe6df0b71054fd5dcc1f806bd492acc9cf3383c8daf3a11be09a0caf1d58391db3fbcecc059c6a1f29188f528f4a63

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNgp0xyY:V6a+pOtEvwDpjtzx

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-10_e5bdbee3e0bd3d7737cd185e23402874_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-10_e5bdbee3e0bd3d7737cd185e23402874_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3844
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    96KB

    MD5

    b65f0d644685a3d878ecdb183463299d

    SHA1

    6c4b2e158cda0104a7df96771d229717253870d8

    SHA256

    360072f4c34283f1eec36b2c25cfe9d85910c88be4875f007731c9bc2fb8b174

    SHA512

    4833c1806bb32cc68116aa8add84c575cfedb641e991f8ff96c25442789784bc59aba20eb99b307fda92c05efca3577bcc269df516247a3a998aa0777f2fe8a7

  • memory/116-17-0x0000000002000000-0x0000000002006000-memory.dmp

    Filesize

    24KB

  • memory/116-20-0x0000000001F10000-0x0000000001F16000-memory.dmp

    Filesize

    24KB

  • memory/3844-0-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/3844-1-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/3844-2-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB