Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/03/2024, 14:30

General

  • Target

    2024-03-25_9faf328f7b247ac8e9ed84164497285f_cryptolocker.exe

  • Size

    80KB

  • MD5

    9faf328f7b247ac8e9ed84164497285f

  • SHA1

    736737666ae839a7cd5f176788cc5d516e039e2c

  • SHA256

    bc1406c0f2b353ad994096c616eb269b760c443335b219a7a5a16b801ea16505

  • SHA512

    710e296f4e768b4d213f387c214c8f20d0b53da97d958c4d1e501325ba2f6f32c4770466e91b2194aa507a53bcdb8330959b2c5097e8dabfa390ac0ed38ec747

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjyaLccVNlmnF:V6a+pOtEvwDpjvp0

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-25_9faf328f7b247ac8e9ed84164497285f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-25_9faf328f7b247ac8e9ed84164497285f_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4948

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          80KB

          MD5

          2f6e7675d5af9413f79badff5d5ff8d8

          SHA1

          5ce28a2c42c4d70ca6429926e6ae6cee372874c5

          SHA256

          f0b4f5814c89eaf457890e95b730f46bdcb163c33d598f897aecab2a4484f206

          SHA512

          84914be3a3646b6757412f147b68d5c1caaf5358c8311f4ef9c55a9c90a1d0260f4ad22816e9cd97627137e065c9b8f189fcd880a9bc5e26f6803c47753a6242

        • memory/2292-0-0x00000000006A0000-0x00000000006A6000-memory.dmp

          Filesize

          24KB

        • memory/2292-1-0x00000000006A0000-0x00000000006A6000-memory.dmp

          Filesize

          24KB

        • memory/2292-2-0x0000000000750000-0x0000000000756000-memory.dmp

          Filesize

          24KB

        • memory/4948-17-0x00000000006C0000-0x00000000006C6000-memory.dmp

          Filesize

          24KB