Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2024, 06:00

General

  • Target

    2024-04-15_6d0f1c88ead88036a6110c66c0da0a9d_cryptolocker.exe

  • Size

    89KB

  • MD5

    6d0f1c88ead88036a6110c66c0da0a9d

  • SHA1

    28df82a7b4363c63e83977cf0df4f6fbf720d587

  • SHA256

    df92f4c5cf8e99b4d33f2ac5e65cb5851131e83016df111507440f57936515c9

  • SHA512

    f47dc2a67c2b3f287b39d5b6b1ff93bdfd3b9264f5ed36e858c76d303907ba18fe52b7eaf12224aa413e7557fcb3287522eeaa914405431d3899d9f795a49685

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgddY:AnBdOOtEvwDpj6zs

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • UPX dump on OEP (original entry point) 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-15_6d0f1c88ead88036a6110c66c0da0a9d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-15_6d0f1c88ead88036a6110c66c0da0a9d_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1172
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=5224,i,6862816582779850255,3437582573780299282,262144 --variations-seed-version --mojo-platform-channel-handle=4292 /prefetch:8
    1⤵
      PID:1204

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\asih.exe

      Filesize

      89KB

      MD5

      863c97d600b725063fcff6424a4028a7

      SHA1

      79c120ba122116287e903e900b53469b81eb96f9

      SHA256

      4b25ae0b02487f765b9b522b57840f51b2484544e54383d889b8e685cd306f0e

      SHA512

      d316472fec70292020f66312dadf6621ad3077e5b99666b518fc3e15d8f2c14aaeb2f794ddf7244cdd07de157a602722a7da6f94b5ff07d41ce215dca87c46c4

    • memory/1172-19-0x00000000004D0000-0x00000000004D6000-memory.dmp

      Filesize

      24KB

    • memory/1172-25-0x0000000000490000-0x0000000000496000-memory.dmp

      Filesize

      24KB

    • memory/1172-27-0x0000000000500000-0x000000000050F000-memory.dmp

      Filesize

      60KB

    • memory/3068-0-0x0000000000500000-0x000000000050F000-memory.dmp

      Filesize

      60KB

    • memory/3068-1-0x00000000005E0000-0x00000000005E6000-memory.dmp

      Filesize

      24KB

    • memory/3068-2-0x00000000005E0000-0x00000000005E6000-memory.dmp

      Filesize

      24KB

    • memory/3068-3-0x0000000000600000-0x0000000000606000-memory.dmp

      Filesize

      24KB

    • memory/3068-16-0x0000000000500000-0x000000000050F000-memory.dmp

      Filesize

      60KB