Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 05:31

General

  • Target

    2024-04-17_20781810b801d868248bbe674409c936_cryptolocker.exe

  • Size

    41KB

  • MD5

    20781810b801d868248bbe674409c936

  • SHA1

    91864ac90c115483971b3aa1a26a988fc87e14b6

  • SHA256

    95c4aebc4969c146663ce31314f08026e1a0aa34b9b20d96b77e346408640cff

  • SHA512

    944ba70d2608257e98743ce0ea04ef635535aef8629f8fb2a095d0c71183f1e297fd18eb32941a602a61643944433b00e14ab18de83ec1548f6be84512c80fc7

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFHuRcx:X6QFElP6n+gJQMOtEvwDpjBmzDkWx

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-17_20781810b801d868248bbe674409c936_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-17_20781810b801d868248bbe674409c936_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    41KB

    MD5

    b4ab9bbbd7a50136220a47c71d01415b

    SHA1

    274b397dbaae1917b43a87426088e79eeafe6096

    SHA256

    d8d0b43a21309355e945a24b57e4c54e8714b726d1f39df8c0f1381347532dc5

    SHA512

    827a2484bb11948270e035cc423d07f4e1c39621ca2a8bb2b3dec6cfbcca46d8fe987d207115348172590b458d404ce84a0ce228cba5786e297ffcb1ca9fed5a

  • memory/1900-0-0x00000000004C0000-0x00000000004C6000-memory.dmp

    Filesize

    24KB

  • memory/1900-1-0x00000000004C0000-0x00000000004C6000-memory.dmp

    Filesize

    24KB

  • memory/1900-2-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/4568-19-0x0000000000560000-0x0000000000566000-memory.dmp

    Filesize

    24KB

  • memory/4568-17-0x0000000000680000-0x0000000000686000-memory.dmp

    Filesize

    24KB