Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2024, 10:01

General

  • Target

    2024-03-15_b58fb2b88d7217fc71fcf44977203c64_cryptolocker.exe

  • Size

    61KB

  • MD5

    b58fb2b88d7217fc71fcf44977203c64

  • SHA1

    47ebe6ab8e2b4b24a23174c8315c2c8c778e4ba7

  • SHA256

    e0ae79b19af7e834effedb9d02bf6fc8d24337f4e532a9fde85d05b44af33c1c

  • SHA512

    28a01e79544cad510b085607c21e94b4752adf7c5f4aef719ddb1350c501985e4ea2a34107966ee3d13af8f61bab551bb104232cfc0496b8f44a978ae3efadb6

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBccD2RuoNmuBLZ/xblzod:X6a+SOtEvwDpjBrO0

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-15_b58fb2b88d7217fc71fcf44977203c64_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-15_b58fb2b88d7217fc71fcf44977203c64_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1632

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          62KB

          MD5

          d0eb36854db136157a6d62c5fbd02fd9

          SHA1

          3bf8765f0f29ef098a655b059d340ef3f74dc8f4

          SHA256

          2f31e7cd59a5c1f9c820f400401c17328edb0ca1d91ef1357b71cb189656ba56

          SHA512

          24697597834cf9992154d97c1f7190429ec8b17e2a4ce4d3bb9127583c51447b837f3eb898d2e48487dc623babed8902219e9cae3a65ca88d2d3f193bdbc6c8a

        • memory/2652-0-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/2652-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/2652-2-0x00000000004F0000-0x00000000004F6000-memory.dmp

          Filesize

          24KB