Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2024, 22:38

General

  • Target

    2024-03-18_af523b84faed36747a810ac0237402fb_cryptolocker.exe

  • Size

    96KB

  • MD5

    af523b84faed36747a810ac0237402fb

  • SHA1

    d881f494c23580269807b85218a04898e405ad7e

  • SHA256

    24fbb8f5ea060cc6220306d8a53987eaf60f9809bf03f2b95a45b27ea0d2c6cc

  • SHA512

    5f7d9a23ccd4dc47cadd33ac5b2fe05e6c04976de42f20645461a2e1ed2eeb08b257db6b19aa1b71b7814180fb16a386e7bf0bd2c52a13a4fba0e0ca831b1ad0

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNgpUF:V6a+pOtEvwDpjtz3

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-18_af523b84faed36747a810ac0237402fb_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-18_af523b84faed36747a810ac0237402fb_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2216
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:2512
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1956

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\asih.exe

      Filesize

      96KB

      MD5

      28ce5d6a2d43f2fedc03931de0eaacee

      SHA1

      c516114f9b893582856d98fd68f72b560a838e7c

      SHA256

      55e4ca6ab3a7f21d354dfb372b99b79afcce5b873c44f38f7ffc22f0f760d07b

      SHA512

      883cb6bc8ee6890d254747647a5704bcb4360f31c52e5d2d6f5f0265c1cb13a2556049a1efe70b6cc97b233084117942f650ebb65780583e26f6ca2491ae4a3c

    • memory/1956-60-0x0000018255F70000-0x0000018255F71000-memory.dmp

      Filesize

      4KB

    • memory/1956-61-0x0000018255F70000-0x0000018255F71000-memory.dmp

      Filesize

      4KB

    • memory/1956-88-0x0000018255DC0000-0x0000018255DC1000-memory.dmp

      Filesize

      4KB

    • memory/1956-76-0x0000018255BC0000-0x0000018255BC1000-memory.dmp

      Filesize

      4KB

    • memory/1956-73-0x0000018255C80000-0x0000018255C81000-memory.dmp

      Filesize

      4KB

    • memory/1956-24-0x000001824D950000-0x000001824D960000-memory.dmp

      Filesize

      64KB

    • memory/1956-70-0x0000018255C90000-0x0000018255C91000-memory.dmp

      Filesize

      4KB

    • memory/1956-56-0x0000018255F40000-0x0000018255F41000-memory.dmp

      Filesize

      4KB

    • memory/1956-57-0x0000018255F70000-0x0000018255F71000-memory.dmp

      Filesize

      4KB

    • memory/1956-59-0x0000018255F70000-0x0000018255F71000-memory.dmp

      Filesize

      4KB

    • memory/1956-68-0x0000018255C80000-0x0000018255C81000-memory.dmp

      Filesize

      4KB

    • memory/1956-40-0x000001824DA50000-0x000001824DA60000-memory.dmp

      Filesize

      64KB

    • memory/1956-65-0x0000018255F70000-0x0000018255F71000-memory.dmp

      Filesize

      4KB

    • memory/1956-62-0x0000018255F70000-0x0000018255F71000-memory.dmp

      Filesize

      4KB

    • memory/1956-63-0x0000018255F70000-0x0000018255F71000-memory.dmp

      Filesize

      4KB

    • memory/1956-64-0x0000018255F70000-0x0000018255F71000-memory.dmp

      Filesize

      4KB

    • memory/1956-58-0x0000018255F70000-0x0000018255F71000-memory.dmp

      Filesize

      4KB

    • memory/1956-66-0x0000018255F70000-0x0000018255F71000-memory.dmp

      Filesize

      4KB

    • memory/1956-67-0x0000018255C90000-0x0000018255C91000-memory.dmp

      Filesize

      4KB

    • memory/2196-2-0x0000000002100000-0x0000000002106000-memory.dmp

      Filesize

      24KB

    • memory/2196-0-0x0000000000740000-0x0000000000746000-memory.dmp

      Filesize

      24KB

    • memory/2196-1-0x0000000000740000-0x0000000000746000-memory.dmp

      Filesize

      24KB

    • memory/2216-23-0x00000000004E0000-0x00000000004E6000-memory.dmp

      Filesize

      24KB

    • memory/2216-17-0x0000000000590000-0x0000000000596000-memory.dmp

      Filesize

      24KB