Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2024, 05:06

General

  • Target

    2024-04-22_960d6954cb2ba76c4898c98cc723e8c6_cryptolocker.exe

  • Size

    74KB

  • MD5

    960d6954cb2ba76c4898c98cc723e8c6

  • SHA1

    974a463420669b275c46a1f5cec641d30f51ae06

  • SHA256

    94fc3cd54eb0aee41249980ac8e6af5c4ceb5d8c30180518a91775af27b416eb

  • SHA512

    0f2029ffec761dc82f59d136571801e1993a5c814385b9972fdb0d8fa3e8210ec93cc48b07d9c3c9d30f0d0c8d41d4061dca263a5db1d44afc0f24b2fb9a76b7

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1rHsoLq:X6a+SOtEvwDpjBZYvQd2+

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-22_960d6954cb2ba76c4898c98cc723e8c6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-22_960d6954cb2ba76c4898c98cc723e8c6_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    75KB

    MD5

    77d6d5781cc60f86090d916e73e71ad0

    SHA1

    23b8dffd70319943032ac6a57c9e5ab4ccc0fb4f

    SHA256

    8d46e8b3337c91a860fa8048c48986cd8f107efcadcc39eb477d5c6ce498c6b9

    SHA512

    90d05af87b48e430e54a42072819ba2efe914eacf0623131b6a11fa71ee50b72892531468e988d1c60f7984f540ed562176ebe4da8cc73a9917a2f2be40d6975

  • memory/2676-0-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/2676-1-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/2676-2-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB

  • memory/4264-17-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB

  • memory/4264-19-0x0000000000560000-0x0000000000566000-memory.dmp

    Filesize

    24KB