Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2024, 21:45

General

  • Target

    2024-03-15_f34063e743f30c1a415b8ea9c4553a7c_cryptolocker.exe

  • Size

    74KB

  • MD5

    f34063e743f30c1a415b8ea9c4553a7c

  • SHA1

    dbe9bf16d5faa0c0ad04a1e0932d4cf52444906a

  • SHA256

    e91d002438dce46443bb245d608d5b6e5db4f4b8366c4ebc914fe3afd78f3d1a

  • SHA512

    c5031182ca2ab3b9236d5dabed70c0956786cfe00cb63547b66d0f919c56cea4db0378104c63dec447039679bd610ea2ded583d5a661b027aba9f4876ac2cd73

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1sil:X6a+SOtEvwDpjBZYvQd2f

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-15_f34063e743f30c1a415b8ea9c4553a7c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-15_f34063e743f30c1a415b8ea9c4553a7c_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4432
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    75KB

    MD5

    56fae8d34941bd844740b5b68118e446

    SHA1

    979ae10a7d58dee7767bc7443bd28ba5b2e77142

    SHA256

    77bf915337a0a8d92982e21003ce81421e7903886c12b3b434a448e62d8c694e

    SHA512

    0bdbf2c97cb3ade65ea6ce135695dd7d10b0ab1c3a76c269d32e4ffbaee2614f9f8298caf8f07c988b88429503791b4b2b30a7d9785a2f571c56be89f655cc73

  • memory/4432-0-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/4432-1-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/4432-2-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB

  • memory/4744-18-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB

  • memory/4744-17-0x0000000000750000-0x0000000000756000-memory.dmp

    Filesize

    24KB