Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2024, 13:45

General

  • Target

    2024-04-09_aba8b9ec831fa862cf4cbf5742db0e1c_cryptolocker.exe

  • Size

    133KB

  • MD5

    aba8b9ec831fa862cf4cbf5742db0e1c

  • SHA1

    97ef1fb4c239dc5738625c67466ae6c0df5f3803

  • SHA256

    36b75963f19ce5118a5d6d246261281e52af7536d46b2f7f93039fa241915a93

  • SHA512

    117fe0a150fa7bcd78187dc6ec50968929aae1ce49ebbcc5f32ec086a2719ce6181b0b2f7443276ffc287b1556c080da4ac8ad0d466c449e9226422bea138a0a

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjQGYQbxGYQbxGYQblPgP:V6a+pOtEvwDpjt226

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-09_aba8b9ec831fa862cf4cbf5742db0e1c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-09_aba8b9ec831fa862cf4cbf5742db0e1c_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3168

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          133KB

          MD5

          32313a78e34bb28f4e7a99947d8834bf

          SHA1

          e8b3295f408817b37d4ad09bf2a0067cea38f054

          SHA256

          65baf29dc61fd1c2015517d9374635ffcc9e9c17f30fdae3405539fa0a7bf470

          SHA512

          b0af990b97763781f8d300c05fd4b90e1d97e2dc1ce3876b39543844f47cf7381f39ac20b4b06467668fc009d1604e277e3e2e22ca285cc6a977818d04e52f0c

        • memory/1940-0-0x0000000002050000-0x0000000002056000-memory.dmp

          Filesize

          24KB

        • memory/1940-1-0x0000000002050000-0x0000000002056000-memory.dmp

          Filesize

          24KB

        • memory/1940-2-0x0000000002070000-0x0000000002076000-memory.dmp

          Filesize

          24KB

        • memory/3168-17-0x00000000005A0000-0x00000000005A6000-memory.dmp

          Filesize

          24KB

        • memory/3168-18-0x00000000005C0000-0x00000000005C6000-memory.dmp

          Filesize

          24KB