Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/03/2024, 06:30

General

  • Target

    2024-03-10_5364eaaa86ae4de11dc3ce8116f3d947_cryptolocker.exe

  • Size

    83KB

  • MD5

    5364eaaa86ae4de11dc3ce8116f3d947

  • SHA1

    10c713a4374ddb3aadeeae2ecdbf9bb7006695fc

  • SHA256

    ff87f474846242760e6a8ef04519d43abcb06b6d43132c87e004bb907cfcbf8d

  • SHA512

    abe9b7d8c883efad02a3dab9c97d611738152050fd64bc24dad89f4d2b9150f9d86b78c963c03c5400dece28e22d01c71254678cb42c3700916e07f2111df29f

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLa5VccPtNw5CS95yFPnN:V6QFElP6n+gMQMOtEvwDpjyaLccVNlr

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-10_5364eaaa86ae4de11dc3ce8116f3d947_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-10_5364eaaa86ae4de11dc3ce8116f3d947_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1452
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    83KB

    MD5

    c7d96657c8848ffb7fe70eef5b327d01

    SHA1

    93cc770c4d9ee2e8072ce38111e7ab908fc71997

    SHA256

    6e495a2ade831a5898b4f1861088e6d1129c07c451b5a99bd5fd3932f3f374de

    SHA512

    bdef78873326039d3733c4126650e89b97747fe90018ee159a4cbb903b0b6ecdb9944c268744e49887eaec3305ee42d51440837bd817d7b269281bdcdd90b30b

  • memory/1452-0-0x0000000000560000-0x0000000000566000-memory.dmp

    Filesize

    24KB

  • memory/1452-1-0x0000000000560000-0x0000000000566000-memory.dmp

    Filesize

    24KB

  • memory/1452-2-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB

  • memory/1904-17-0x00000000007D0000-0x00000000007D6000-memory.dmp

    Filesize

    24KB

  • memory/1904-19-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB