Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-04-2024 03:33

General

  • Target

    2024-04-26_33ac938731f9a7ef083a6908ee6907ed_cryptolocker.exe

  • Size

    130KB

  • MD5

    33ac938731f9a7ef083a6908ee6907ed

  • SHA1

    04a3106e9d245c69923f450363f569f46e95d6c3

  • SHA256

    e7f3e45293982d3dddbe445b18b6ef121e7ddd72d79a99a0122a11d89e8ce360

  • SHA512

    515fff68e42412e6c7d34a4b2f8eda4258573e64decf91cf62c6fdd51d7183c271c5e1ce28c6646e21cd31bae2c4f588ca8cced8d87df14b08b55d768d5697db

  • SSDEEP

    1536:u6QFElP6n+gWMOtEvwDpjJGYQbN/PKwNgpwb2CUvu:u6a++OtEvwDpj6z/

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-26_33ac938731f9a7ef083a6908ee6907ed_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-26_33ac938731f9a7ef083a6908ee6907ed_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    131KB

    MD5

    8bd5e7abfc0b6a1061d675b7b857e023

    SHA1

    b46c46e41950bb97fe6dd449bf78092627cd0348

    SHA256

    4519232495f6f6560470052889f93a69db2d253b8e26101b851f7fd3bdccc968

    SHA512

    0af0dce12872cad2cf72f6f2c9f8466389a7d2ee53fc2749a78b1ae99ce88d6497089758282a31a0e241123ed98922b0856fe2f806a42449b01e14200c8ff2a9

  • memory/836-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/836-0-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/836-2-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/2900-18-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB

  • memory/2900-17-0x00000000007D0000-0x00000000007D6000-memory.dmp

    Filesize

    24KB