Analysis

  • max time kernel
    150s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 15:51

General

  • Target

    2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe

  • Size

    42KB

  • MD5

    c8b54b9a5696cba9aa572605b7be69f5

  • SHA1

    aa0c189906106289b178db272c5db057883bbc8f

  • SHA256

    679c9c7e336690ac6c011efc3b81619b0bbadbe3c6c66aa85c25f7bc6100f3b6

  • SHA512

    094b027b5731dc15f567fa968c2a8c22cd2abd97cfed17dd2e2bc091e9629a439f75a9745557ec6f4f5cf4a31fcf85f462a952648e5b85e87f3fee2e57ec38ba

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5aFr7YOzzb5:V6QFElP6n+gMQMOtEvwDpjyaYaFAY

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5104
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2988
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1032 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2264

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\asih.exe

            Filesize

            42KB

            MD5

            cb6468a4251157f3f0b4273ac32dcc02

            SHA1

            6bc3779c616bf37d5d7d0b81794531bee804e712

            SHA256

            ef34f4d838e3d8192307f8111af1f1bff9d1b77b2276c51d32f2166f46ea0fd8

            SHA512

            0a8497453e40c000dee82c8dcf11a25c15dff3e83ad0444c471b4db766407c6f9787625277a1f32d55ba896e9a26596902ed31bd3aca112252ec30d43d1feec2

          • memory/2988-20-0x00000000021E0000-0x00000000021E6000-memory.dmp

            Filesize

            24KB

          • memory/5104-0-0x00000000020D0000-0x00000000020D6000-memory.dmp

            Filesize

            24KB

          • memory/5104-1-0x00000000020D0000-0x00000000020D6000-memory.dmp

            Filesize

            24KB

          • memory/5104-2-0x00000000020F0000-0x00000000020F6000-memory.dmp

            Filesize

            24KB