Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/04/2024, 11:30

General

  • Target

    2024-04-08_2c92432e87149c5d6a35e7d7bdfa52a9_cryptolocker.exe

  • Size

    133KB

  • MD5

    2c92432e87149c5d6a35e7d7bdfa52a9

  • SHA1

    b8dbb5faaf599eb342ee8dfd5871052bff33683b

  • SHA256

    1c27769e0cf4587b401091405b58fd7589099abc6a1e5780a5c3a99531806cf8

  • SHA512

    2d7b7e1920221780a74fec8608e315435bd79b52ac0d9771bca5bfbf6c48f1f05fd65e9c2a8c195fd1c354167e6fcc082319ff413bab52445718b3a929a4db7b

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjQGYQbxGYQbxGYQblPgV:V6a+pOtEvwDpjt22c

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-08_2c92432e87149c5d6a35e7d7bdfa52a9_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-08_2c92432e87149c5d6a35e7d7bdfa52a9_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4684
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    133KB

    MD5

    bb9ddcd7a2838dcba2d367320826ae25

    SHA1

    7351b83d6bfbbaa7053dd58e1585aeb726b0658e

    SHA256

    8b6cd915e05e6fd4816c12feef94eec8f7954d11ad03d5b5e40f7f7df53fe699

    SHA512

    923e6b72e6f6a6b81aec743f909e3b24ca534cfed603b39df58ddc0091415162c9d7cb86f4629cac60da5ac180f03b60f3ca0d822e7bf2a442a8c71305678f31

  • memory/2384-17-0x00000000006D0000-0x00000000006D6000-memory.dmp

    Filesize

    24KB

  • memory/2384-23-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/4684-0-0x00000000021E0000-0x00000000021E6000-memory.dmp

    Filesize

    24KB

  • memory/4684-1-0x00000000021E0000-0x00000000021E6000-memory.dmp

    Filesize

    24KB

  • memory/4684-2-0x0000000002100000-0x0000000002106000-memory.dmp

    Filesize

    24KB