Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/04/2024, 11:39

General

  • Target

    2024-04-16_f89161e4356c537873a5f9ad235fdebd_cryptolocker.exe

  • Size

    163KB

  • MD5

    f89161e4356c537873a5f9ad235fdebd

  • SHA1

    625f211e32fa8f67f139aa1488cf3066da4509c2

  • SHA256

    efc585005167abe6a76392600dfa5af604fde1b2b6be913ccf413decdabb27a1

  • SHA512

    ddfcf194dfd86b56d1d22c2fb023afce4364bf71981d494978fbe72bd10dd79c4fce55b8f046a09cab0219e32df9e9140860acad5ad06d1341a02a2d31c96316

  • SSDEEP

    1536:u6QFElP6n+gWMOtEvwDpjJGYQbN/PKwNgp699GNtL1eIEMJ:u6a++OtEvwDpj6zq

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-16_f89161e4356c537873a5f9ad235fdebd_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-16_f89161e4356c537873a5f9ad235fdebd_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:752

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          163KB

          MD5

          bc3524f1d273b725e2605d943c2ed5cb

          SHA1

          2f1b8fd0f8585a855eca3480cbba94f34c35e970

          SHA256

          829d2e22ca3060f43df83da2ab951e15d58cad49e92688c16ae03fc763eff287

          SHA512

          1f0f7cfa935995660736ea6bd0ac4dfe53abbfd2fbeb5a7db89a5226d1f4fd674a6fd71fcbc80014773d03132cf1e0b8d536d0bc5e3c1f9914d45f672abd17a2

        • memory/752-17-0x00000000004E0000-0x00000000004E6000-memory.dmp

          Filesize

          24KB

        • memory/752-19-0x00000000004C0000-0x00000000004C6000-memory.dmp

          Filesize

          24KB

        • memory/2240-0-0x0000000000690000-0x0000000000696000-memory.dmp

          Filesize

          24KB

        • memory/2240-1-0x0000000000690000-0x0000000000696000-memory.dmp

          Filesize

          24KB

        • memory/2240-2-0x0000000000840000-0x0000000000846000-memory.dmp

          Filesize

          24KB