Analysis

  • max time kernel
    147s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2024 04:44

General

  • Target

    2024-04-20_ac7f9fb476e82a0272c4f41768f8d7f6_cryptolocker.exe

  • Size

    74KB

  • MD5

    ac7f9fb476e82a0272c4f41768f8d7f6

  • SHA1

    f03e5689695f2190c61a501e306d9439f706ff4c

  • SHA256

    062b021e647c46610efc3172452b4006afcf992b131c01aedccd06543845847a

  • SHA512

    849af5a0c6320944c1f17009cdbcb323a85d4167a3660036c30031ee69b364497f5810d49e392c350e3c54c06b851805afb6594a85d83414a8ab4a1ab278c3df

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1rHs9:X6a+SOtEvwDpjBZYvQd2O

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-20_ac7f9fb476e82a0272c4f41768f8d7f6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-20_ac7f9fb476e82a0272c4f41768f8d7f6_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3496
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4084 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4264

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\asih.exe

      Filesize

      74KB

      MD5

      79aa43cb9625e40a4dbb760a8955113c

      SHA1

      63b54d87c60f84cb5ba30b18cb20ec0deed7c37c

      SHA256

      3c421d032990e3e5a3cedbdaace68a773d4373479376d40c550bdc46538016dc

      SHA512

      74304de7f87924107218f826759644c6b59151ad400cd46b967ff39c845c74b691d2deac867b09fe238021dcc7b081f12db9759ed5919ab270fd02f41dcbfd3a

    • memory/1516-0-0x0000000000520000-0x0000000000526000-memory.dmp

      Filesize

      24KB

    • memory/1516-1-0x0000000000520000-0x0000000000526000-memory.dmp

      Filesize

      24KB

    • memory/1516-2-0x0000000002230000-0x0000000002236000-memory.dmp

      Filesize

      24KB

    • memory/3496-17-0x0000000000750000-0x0000000000756000-memory.dmp

      Filesize

      24KB

    • memory/3496-19-0x0000000000730000-0x0000000000736000-memory.dmp

      Filesize

      24KB