Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/04/2024, 20:28

General

  • Target

    2024-04-28_8ca08e1d133fff1715a5cba4e5ebfffd_cryptolocker.exe

  • Size

    40KB

  • MD5

    8ca08e1d133fff1715a5cba4e5ebfffd

  • SHA1

    5e15d40099b4eeba266685f89f9244a2f174d89a

  • SHA256

    3f5a8bc006cc90ddd7c8735790ad443bfbed3ae9d3027067b3a5f3099a85fab9

  • SHA512

    4cdce6824e7a8fc06a7dad0b1030177fd8e810ab762347d506331f8564dd14d1229c4e1096f7b09ff6405469c001e88af835696ffb48a584dc66413d2771947f

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaac4HKcfrs:X6QFElP6n+gJQMOtEvwDpjBsYK6rs

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-28_8ca08e1d133fff1715a5cba4e5ebfffd_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-28_8ca08e1d133fff1715a5cba4e5ebfffd_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:556
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    40KB

    MD5

    a32c47392d4c5d6de8c2d5d6c1284d5c

    SHA1

    77ad0d94c8f437c9ce577729fabc0f905c8ba83b

    SHA256

    e8e2ec44b367cd2224b88bc194a6c721dbde7da19e84f8232555ac7f079059c6

    SHA512

    5e669097ed1773be66ad43926505e49d28165f99ab8508d7d919403c8cb5e1659d636e23fd70ef52990937bce4015de55147450e9a487f68b5cda2a754f304f0

  • memory/556-0-0x0000000000830000-0x0000000000836000-memory.dmp

    Filesize

    24KB

  • memory/556-1-0x0000000000850000-0x0000000000856000-memory.dmp

    Filesize

    24KB

  • memory/556-8-0x0000000000830000-0x0000000000836000-memory.dmp

    Filesize

    24KB

  • memory/856-17-0x0000000002100000-0x0000000002106000-memory.dmp

    Filesize

    24KB

  • memory/856-23-0x00000000020E0000-0x00000000020E6000-memory.dmp

    Filesize

    24KB