Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/04/2024, 23:42

General

  • Target

    2024-04-05_f9fe90e6a77615c74dd12a93b59ca133_cryptolocker.exe

  • Size

    50KB

  • MD5

    f9fe90e6a77615c74dd12a93b59ca133

  • SHA1

    4f55ae44b7b41dc15f4095939c273d596e779761

  • SHA256

    bf82f1d019a47d7c85f03ebb5287282a0d0e404f80f252790931737c129810bf

  • SHA512

    2790b50b38e1f5ddb151acc2e4bf74e2e8b7130a144cb8b33c7085f9889931e6891e6e9a99471e34f11b54600499c9a14f414e969aef65e1b0c6c1c93bf3f1ef

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvMF:BbdDmjr+OtEvwDpjMX3

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-05_f9fe90e6a77615c74dd12a93b59ca133_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-05_f9fe90e6a77615c74dd12a93b59ca133_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1196

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          50KB

          MD5

          5a3c5f9f2b81a55daed644e6c34f9620

          SHA1

          42d78da0c7ae9ba8d6bb6374ca15cce2e8e9e211

          SHA256

          192ce8e99a2f932c87152c9236dd20a21e723bfff3fcc65cdc9c664ae7541db3

          SHA512

          0350baf55b3ccca23318106d20184fbb5dc2c21231030ed0ec1828191ab04be2bdc3104a8c3cdf46472f8493f00baf3ba740642b8e89ef3ee527101be7ad46aa

        • memory/1196-20-0x0000000000850000-0x0000000000856000-memory.dmp

          Filesize

          24KB

        • memory/1196-19-0x00000000006A0000-0x00000000006A6000-memory.dmp

          Filesize

          24KB

        • memory/1196-26-0x0000000000500000-0x0000000000510000-memory.dmp

          Filesize

          64KB

        • memory/1404-0-0x0000000000500000-0x0000000000510000-memory.dmp

          Filesize

          64KB

        • memory/1404-1-0x0000000002050000-0x0000000002056000-memory.dmp

          Filesize

          24KB

        • memory/1404-2-0x0000000002050000-0x0000000002056000-memory.dmp

          Filesize

          24KB

        • memory/1404-3-0x0000000002080000-0x0000000002086000-memory.dmp

          Filesize

          24KB

        • memory/1404-17-0x0000000000500000-0x0000000000510000-memory.dmp

          Filesize

          64KB