Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/03/2024, 00:33

General

  • Target

    2024-03-20_438c67f1ad3aa80aee64fbce1257396b_cryptolocker.exe

  • Size

    35KB

  • MD5

    438c67f1ad3aa80aee64fbce1257396b

  • SHA1

    9f41ee9998649da7067682c73e7150f42203a9b8

  • SHA256

    fced233d56897cbb6818f5503e958499fbc3fed0426283dbf4bc9a93e767e012

  • SHA512

    cb183b1b831531dea5a5fd5479d2c4e318a653630be2e3ffb2585c043ace183b0dd6963f6a47ee93cf472e39a621dc89ede0f0b02635e8773a7aa153d3b141bf

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkUX:qDdFJy3QMOtEvwDpjjWMll

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-20_438c67f1ad3aa80aee64fbce1257396b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-20_438c67f1ad3aa80aee64fbce1257396b_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4836
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    36KB

    MD5

    47b4e63ffeb3cadadffd0dfaa4da298a

    SHA1

    aeb2975ca918f84c04d9e59424b7d6a6fa2b901b

    SHA256

    bb2f46c548f25c345c70063e21c06ace0e4db64ac19156f419c269cb0e560e4c

    SHA512

    c06612d90dcd740e5992d662bcaf9ab4bf0c0f843683f6a96e31338b04b6983df5609662a0a3857cab7241b23fa16ca38d23881474807c5dbac8de81365405f3

  • memory/2868-18-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2868-21-0x0000000002060000-0x0000000002066000-memory.dmp

    Filesize

    24KB

  • memory/2868-20-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/2868-27-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/4836-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/4836-1-0x0000000000650000-0x0000000000656000-memory.dmp

    Filesize

    24KB

  • memory/4836-2-0x0000000000650000-0x0000000000656000-memory.dmp

    Filesize

    24KB

  • memory/4836-3-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB

  • memory/4836-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB