Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/04/2024, 03:49

General

  • Target

    2024-04-16_741235b385975d62a951185c1358f8d1_cryptolocker.exe

  • Size

    49KB

  • MD5

    741235b385975d62a951185c1358f8d1

  • SHA1

    24e3f05218554b4e65013b96521c6b4d93bdfab0

  • SHA256

    2e9f99cae9c23f42e194a0c33a1471f74250eef70cb6edde88a8410ee35efee5

  • SHA512

    5a92a98e649c229e1b5685a0404e141a63a613aa7d6903a92b7ef69b7e605286ce2450a35e93ea32ba9acd7e1eaa577741763d401a130dc3cbd44c034dc60df6

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu55id3AMWZj:X6QFElP6n+gJQMOtEvwDpjB0GIWiWLt

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-16_741235b385975d62a951185c1358f8d1_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-16_741235b385975d62a951185c1358f8d1_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:460
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2332

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          49KB

          MD5

          98e355cbdf58e035460b2b524ef75e0a

          SHA1

          b6fcc772afd156853e75cb10ef3957f975be2966

          SHA256

          099a56844123d9a99f4305281698e15b07d9c7679809e30967fd38a7bddfb2b1

          SHA512

          77873189c86e357326c07637a6b2fca6f62a874f0da310d0c89bafe497006265a53e3e38238217a4398c4d29714704e4fb2fae47da2118fa76d04803f77f9cf1

        • memory/460-0-0x0000000002210000-0x0000000002216000-memory.dmp

          Filesize

          24KB

        • memory/460-1-0x0000000002210000-0x0000000002216000-memory.dmp

          Filesize

          24KB

        • memory/460-2-0x0000000002230000-0x0000000002236000-memory.dmp

          Filesize

          24KB

        • memory/2332-17-0x0000000000760000-0x0000000000766000-memory.dmp

          Filesize

          24KB

        • memory/2332-18-0x0000000000740000-0x0000000000746000-memory.dmp

          Filesize

          24KB