Analysis

  • max time kernel
    147s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-03-2024 12:46

General

  • Target

    2024-03-19_f655238965ba90417f43aa1b7fdbcb15_cryptolocker.exe

  • Size

    124KB

  • MD5

    f655238965ba90417f43aa1b7fdbcb15

  • SHA1

    07d17a0ba8dc1659403903ed918706e962b87121

  • SHA256

    6f9ea9815f8107676f7591724c92b94bc95197f238011e459b9c6b750751d7fb

  • SHA512

    e4d220447c0dc1e88796031f0b7aedd0ace5fa2044ae7b348e5ed1e98cae07f9448e54885384813659493d065910c56c2c0caece71b1eb8e9296505dabc94d3e

  • SSDEEP

    1536:u6QFElP6n+gWMOtEvwDpjJGYQbN/PKwMgdTM:u6a++OtEvwDpj6zy

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-19_f655238965ba90417f43aa1b7fdbcb15_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-19_f655238965ba90417f43aa1b7fdbcb15_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4076
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3196
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3932 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:440

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\asih.exe

      Filesize

      124KB

      MD5

      6c5983d4ea905e6c131775452cd7f8b3

      SHA1

      1ef8932b2a542300473f6c977dfd8f1081be0a65

      SHA256

      bf6845da96813de34346c99da30b08e4eef56f519e1b9a3e85434468f9e39d69

      SHA512

      238acbf36a0abb189712c2d3a6bee1e3db4d0d5cfcc50f3ad3725ce7258d3065f15a108744aeb2ef4753e4c5080c6b00a3e21978f84cf6fa76fa8f8c99ca0aed

    • memory/3196-17-0x00000000005A0000-0x00000000005A6000-memory.dmp

      Filesize

      24KB

    • memory/3196-18-0x00000000005D0000-0x00000000005D6000-memory.dmp

      Filesize

      24KB

    • memory/4076-0-0x00000000006A0000-0x00000000006A6000-memory.dmp

      Filesize

      24KB

    • memory/4076-1-0x00000000006A0000-0x00000000006A6000-memory.dmp

      Filesize

      24KB

    • memory/4076-2-0x00000000006C0000-0x00000000006C6000-memory.dmp

      Filesize

      24KB