Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-04-2024 05:29

General

  • Target

    2024-04-24_1c33e1c05e1b9bac6ad6df08902677c1_cryptolocker.exe

  • Size

    39KB

  • MD5

    1c33e1c05e1b9bac6ad6df08902677c1

  • SHA1

    2e05aba65f8639a876f214a10523149fa560917c

  • SHA256

    91e2204c2fb084836caca6f7ab16fd56f375320176dcf7ce8f810efdec957010

  • SHA512

    f822d9bd03c8825dc0d20ef717d6297bec0c5b42b171b1a2bcdcb827b2f83d58606d0da2f97d5e6e80850a537b5384505d1cc50d9e16afbbd8d474bf0080cb2b

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5axZmGKz:V6QFElP6n+gMQMOtEvwDpjyaYa/mlz

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-24_1c33e1c05e1b9bac6ad6df08902677c1_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-24_1c33e1c05e1b9bac6ad6df08902677c1_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    39KB

    MD5

    e5b58f363d0349762db5afe368cc11c4

    SHA1

    31dcf4d4488636b6aa13645ed56d51f03a3ccf4e

    SHA256

    64e1378ac6a7b467f59aa7bb72343596ac56ce5b8d7e3c71a31cc9e8630f5d30

    SHA512

    4dbcb76b09de5cc4645e7288db41635336e66b91b9d3cf1c993cbb46440d080ae884f80f47db39deaefb068b1e111ff4929d84b9a734c4175ecc507226425063

  • memory/408-17-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/408-20-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1076-0-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/1076-1-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/1076-2-0x00000000006D0000-0x00000000006D6000-memory.dmp

    Filesize

    24KB