Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-03-2024 06:07

General

  • Target

    2024-03-16_30c17745d47cba796a4af0c885e6a2ad_cryptolocker.exe

  • Size

    95KB

  • MD5

    30c17745d47cba796a4af0c885e6a2ad

  • SHA1

    55e4a1930b612844694f45896b98f57a2b3f9da4

  • SHA256

    6d78d2c984f1fcc952b83bc188f4464998fe406b987892fb6b9e0740a7fd72d4

  • SHA512

    7c41fae35a8911ce22edc3a77b8169f3902b0b4c84c4b91d68bfb52ab3e7f5106602384812bff393b4f189dda6daf89c10a5f74abc9f8ad973e6825e004606be

  • SSDEEP

    1536:Z6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNC4w7:Z6a+pOtEvwDpjtz2

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-16_30c17745d47cba796a4af0c885e6a2ad_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-16_30c17745d47cba796a4af0c885e6a2ad_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    95KB

    MD5

    595ae40d6a73deb40c2936f7d3b42469

    SHA1

    6e04fc4038238d44a629a1368ec65882f5cfd410

    SHA256

    405da4ae6286cb3c2f747c87b26a49225f4cd18fc057b9072658ae34d378ef2d

    SHA512

    cfe57576f86d20b8e4f374f3fd1469c26f684a416e84c3e6373694bf9c3f3f2509d2b8e54a72f6f5ed8766adc251329951ce79181af55c056b652c4168846b20

  • memory/2840-17-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/2840-23-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3060-0-0x0000000002290000-0x0000000002296000-memory.dmp

    Filesize

    24KB

  • memory/3060-1-0x0000000002290000-0x0000000002296000-memory.dmp

    Filesize

    24KB

  • memory/3060-2-0x00000000021A0000-0x00000000021A6000-memory.dmp

    Filesize

    24KB