Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2024, 18:23

General

  • Target

    2024-03-26_114047f29fdc0909101f8f587933d740_cryptolocker.exe

  • Size

    68KB

  • MD5

    114047f29fdc0909101f8f587933d740

  • SHA1

    0cfcc39f472a4c4ef5a684e1a494d90f954a284d

  • SHA256

    3711638b5008d318b962cbc280a27ece46d3a3b12943743438494d1589cb7069

  • SHA512

    42388172e2e3f3680a69e4d47a0a80f58b8ef5304f8f37ba61124fe1cb0432f1501778f51ea388b602c258d533eb443766e4c701537dfd1a1ed4539d9ad97efa

  • SSDEEP

    1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKU9:DW60sllyWOtEvwDpjwF85T

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-26_114047f29fdc0909101f8f587933d740_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-26_114047f29fdc0909101f8f587933d740_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    68KB

    MD5

    a7bd00cb09bce68fa7a94855da60e608

    SHA1

    420a960c007d5fb296140b952d4073a61a6cff6a

    SHA256

    911a7f5abbde8be4603c341879041cefdca9adcf1f1be43d4b8165abdc514da5

    SHA512

    e4f46eec7ecd2570194a4dce18fe65178734beeeb7f441ef023e3bbb8e1d32f3b79d9c6988f83b6562d3962d1f9c088ae908293cff730cca4648b0de63229d08

  • memory/2816-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/2816-1-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/2816-2-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/2816-3-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB

  • memory/2816-18-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/3544-17-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/3544-20-0x0000000000510000-0x0000000000516000-memory.dmp

    Filesize

    24KB

  • memory/3544-21-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB