Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/04/2024, 10:52

General

  • Target

    2024-04-06_acb78140c855f393ada01ed80a9a3373_cryptolocker.exe

  • Size

    51KB

  • MD5

    acb78140c855f393ada01ed80a9a3373

  • SHA1

    23fdfafed17c112f04ccd6eee9e7c6026462d6ee

  • SHA256

    988060c8f79cde4b66446e69d5bea1d40a07a7c3cf62f066a4450613c947d3f1

  • SHA512

    a973ff8e2a120f98c4a6f6bc585ad15dd32b790eff098efed453030600e91c0f5da411a46cd104e32970e6fbdbadd586ebc35dcae92e5e741fe9ef8b69f28fb2

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjeJQ7pojkRaJ:V6a+pOtEvwDpjQ

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-06_acb78140c855f393ada01ed80a9a3373_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-06_acb78140c855f393ada01ed80a9a3373_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5004
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    51KB

    MD5

    cdb6ac3d1da6b4cc30160b1e35138d6f

    SHA1

    fadc0506fd1a72d4570e60a334066da6a8cfbefa

    SHA256

    f77a9a977e121cf4c8ed54f5439aa1187bb39b813b84161675597c5142cd1b5b

    SHA512

    cc0c6ea6dca047198acb3ee18de161fbc80e0b4ff04af482acc438f2fcdb82da9e28093d4794029d1e84aafb83dca43fda993688a3587480cc607260250c04cf

  • memory/4084-17-0x0000000000510000-0x0000000000516000-memory.dmp

    Filesize

    24KB

  • memory/4084-22-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/5004-0-0x00000000006B0000-0x00000000006B6000-memory.dmp

    Filesize

    24KB

  • memory/5004-1-0x00000000006B0000-0x00000000006B6000-memory.dmp

    Filesize

    24KB

  • memory/5004-2-0x00000000006D0000-0x00000000006D6000-memory.dmp

    Filesize

    24KB