Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 03:48

General

  • Target

    2024-04-11_bd0e058401b9c3dc47b5fa8e8cd687b8_cryptolocker.exe

  • Size

    63KB

  • MD5

    bd0e058401b9c3dc47b5fa8e8cd687b8

  • SHA1

    6a8d52d8e3dee99fed865639b9526235f3644358

  • SHA256

    4fe6c5be985a5274713ef7e4c58639fc0bca344dd0f926c566440615ff92416d

  • SHA512

    3e0ce5fc0b6ca63930bc465725d71b1ceaa1c4423f68a46657c89fdc0860989635193363217329529809a15b1ce857355d220793ad49b1457dbf442afcf13643

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts7:BbdDmjr+OtEvwDpjM8j

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-11_bd0e058401b9c3dc47b5fa8e8cd687b8_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-11_bd0e058401b9c3dc47b5fa8e8cd687b8_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    63KB

    MD5

    716efb7d3ddf32867f4ccc560aecbde2

    SHA1

    6243041eeb6050e39dd20734c8408ca65d3300f7

    SHA256

    c977d97bac21e3f43f96f472ad1c8cc1aa74b32c64f30b603cc08d473d29fb03

    SHA512

    57d429e42088c212ede36ca72bc401c55bcd088c117ff90edbc429627da90677e14b445e73e43b07c6e215aef853cef159f12439aec4d86d13b311f1c61564bf

  • memory/1832-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1832-1-0x00000000021C0000-0x00000000021C6000-memory.dmp

    Filesize

    24KB

  • memory/1832-2-0x00000000021C0000-0x00000000021C6000-memory.dmp

    Filesize

    24KB

  • memory/1832-3-0x00000000020E0000-0x00000000020E6000-memory.dmp

    Filesize

    24KB

  • memory/1832-16-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1900-19-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/1900-22-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1900-26-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB