Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2024, 00:26

General

  • Target

    2024-03-13_1f5b0667c7f463a9ad33e1981e78ac14_cryptolocker.exe

  • Size

    26KB

  • MD5

    1f5b0667c7f463a9ad33e1981e78ac14

  • SHA1

    b86cfeff9f684785d1beb84796de48de4a515e61

  • SHA256

    4b3597c19ec0b8da425ac583e4c9c0541395c8bc8a10c121d39da09d764ade71

  • SHA512

    4142670afde1f4dfe8873b79567dec245476d919ec315d12d14083dc5935e3b2144a435a988a56002be9583083de124f386d40695b2cefd41207a56ce20ba064

  • SSDEEP

    384:qxOZzyjOnqGAs+8ULueO4NdE8tOOtEvwDpjqIGRYK1sGGYkxlmwt:q0ZziOWwULueOSdE8tOOtEvwDpjeoZ

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-13_1f5b0667c7f463a9ad33e1981e78ac14_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-13_1f5b0667c7f463a9ad33e1981e78ac14_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4912
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    26KB

    MD5

    d3c45fa0ca81f570b483ee9b20855cb2

    SHA1

    4830322a202beb59f6236d7ccef386dfaab3fd05

    SHA256

    026674c83d3d2e8af45cad281dc4cfa4afe5255c347547240b7c00f41e5ecd08

    SHA512

    fe6ab2668eaaaee79c7b9587289237ddb41c7ccee49d120482a52eea6b93497456fd4df6b7b99c16203d50a17030ef2d3d1e33407bc99471d7f63bc1ba2951b3

  • memory/4312-18-0x0000000000510000-0x0000000000516000-memory.dmp

    Filesize

    24KB

  • memory/4312-23-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/4312-26-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/4912-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/4912-1-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/4912-2-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/4912-3-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/4912-21-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB