Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2024, 06:12

General

  • Target

    2024-04-15_90bbbcba0382769e30d9cf4e45f1892e_cryptolocker.exe

  • Size

    74KB

  • MD5

    90bbbcba0382769e30d9cf4e45f1892e

  • SHA1

    9c1d7e80995df3eb0665489c9a8f97f3dc2bd193

  • SHA256

    c28e133bfdecd2521483456a7516aaf8285ca67fd10ad247b1286d16c1d8bd1f

  • SHA512

    f3999c4a3fe26e42f76ec74ac545795420d33676936d5f410511b7ae845f3c0dcfbf7f1a97f99426572bb154e185fcb2411e55f454ad92d484256a6546779aab

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1rHsC:X6a+SOtEvwDpjBZYvQd25

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-15_90bbbcba0382769e30d9cf4e45f1892e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-15_90bbbcba0382769e30d9cf4e45f1892e_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4860
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3136

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          74KB

          MD5

          d54caebec6a4f65603be48fb2b869868

          SHA1

          5e20da30053f862c1b8e20e9e01354e60bf82a5e

          SHA256

          864a79ccc0d00ef1cdfab1c4a99df296826eaf4f38dc930eced80dd5ebcbaf45

          SHA512

          58b282cf9435b503d03b18b5afed2c9a111db4523312e5169b79b9a6f3d44704384e4653f19d484cdb20191f4b4bd17f3026c0f5f87407a4e728ff00f1dc7dc0

        • memory/3136-18-0x0000000002100000-0x0000000002106000-memory.dmp

          Filesize

          24KB

        • memory/3136-17-0x00000000020D0000-0x00000000020D6000-memory.dmp

          Filesize

          24KB

        • memory/4860-0-0x0000000002150000-0x0000000002156000-memory.dmp

          Filesize

          24KB

        • memory/4860-1-0x0000000002150000-0x0000000002156000-memory.dmp

          Filesize

          24KB

        • memory/4860-2-0x0000000002050000-0x0000000002056000-memory.dmp

          Filesize

          24KB