Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/04/2024, 19:44

General

  • Target

    2024-04-05_06079a0ead3794745d7390088f559460_cryptolocker.exe

  • Size

    36KB

  • MD5

    06079a0ead3794745d7390088f559460

  • SHA1

    e54168e2d86f4ad9b320cd69e130a462ef8a0d36

  • SHA256

    bbbf02c3466c7aeb05dc89aba64c1e75897f4a68be083bc434ac1bc651c59b60

  • SHA512

    d4f293b8f6bab05bd5f3bd99fc8116ebfe9ab82648d631d9b97f133728571aa691327d79e4f6a3da5ba88fa1f6e82ec06a2cb0d9ea2ea0db54892afd528120ab

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/Dpk4P:qDdFJy3QMOtEvwDpjjWMlBP

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • UPX dump on OEP (original entry point) 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-05_06079a0ead3794745d7390088f559460_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-05_06079a0ead3794745d7390088f559460_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1000
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:5112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    36KB

    MD5

    f8393f12ab68419e050720583557a8f6

    SHA1

    1233a3535a19485674f4b718eec6281e685023ce

    SHA256

    2daa081f215e95162196e765c38fc9d102cf0b12aa62fcd2c4a2a0536ebd14a1

    SHA512

    39f519da63f8444c712a74442e90b1b91783ea93cb3cb95263c947545025f19732ed78e1b99b860d912e6902334231dd76c71a198a9398e3e946768600160374

  • memory/1000-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1000-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1000-2-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1000-3-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/1000-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/5112-19-0x0000000002070000-0x0000000002076000-memory.dmp

    Filesize

    24KB

  • memory/5112-21-0x0000000002150000-0x0000000002156000-memory.dmp

    Filesize

    24KB

  • memory/5112-26-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB