Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-04-2024 04:29

General

  • Target

    2024-04-21_cdee6c5724b19b19537734f012c017f5_cryptolocker.exe

  • Size

    38KB

  • MD5

    cdee6c5724b19b19537734f012c017f5

  • SHA1

    ee24e20e215a11b48718f490715a0802d4ced6fe

  • SHA256

    04163c2a15f148678c81d10214d45a9995f283eeb9ddf6d361ca4a84bf1ec2c4

  • SHA512

    252e3315740be1473d190929d00a2943be63523b1c069ea05440d7413a9effdec200cdf885c4b31e9c38b5b88947ba6da644806883acdd6291057b39049c6988

  • SSDEEP

    768:wHGGaSawqnwjRQ6ESlmFOsPoOdQtOOtEvwDpjm6WaJIOc+UPPEkLpw:YGzl5wjRQBBOsP1QMOtEvwDpjgarrkL6

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 3 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-21_cdee6c5724b19b19537734f012c017f5_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cdee6c5724b19b19537734f012c017f5_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    38KB

    MD5

    3067e1f9601e892a9797bd48d61e2a12

    SHA1

    6f8a974d3d72998d1cc5c18246433acf41fa068a

    SHA256

    e277241502a0d8500e0c755369a9baa480e8b74bf3e313ffd7ef511629face21

    SHA512

    ac198aa35ece9541f0cfd711d4a73f669f4f054845d443b89367459cce814a5c162d4ee073bc76c0a6096975b69e746f01af2010c9bfc6f0a102bf02550ce716

  • memory/748-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/748-1-0x0000000000650000-0x0000000000656000-memory.dmp

    Filesize

    24KB

  • memory/748-2-0x0000000000650000-0x0000000000656000-memory.dmp

    Filesize

    24KB

  • memory/748-3-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB

  • memory/748-17-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/2644-19-0x00000000006B0000-0x00000000006B6000-memory.dmp

    Filesize

    24KB

  • memory/2644-24-0x0000000000690000-0x0000000000696000-memory.dmp

    Filesize

    24KB