Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2024, 05:24

General

  • Target

    2024-05-01_3a010972aa3505a80ccb2d0ae950b854_cryptolocker.exe

  • Size

    64KB

  • MD5

    3a010972aa3505a80ccb2d0ae950b854

  • SHA1

    4d36470535176f9de104ce9689dda388ad16edc4

  • SHA256

    0f37cc0f2834c5ed952a5d3799be6178713ceadb786defe898f47a91d224bb57

  • SHA512

    95e3f20b3c73693f3ddb35b1aeb435a0a62ef6636302bb2bc5182b3c94d26b1809e39c58c0b4b07a446291f136506568e6205d5bcce12c767992f58ed4f11af2

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjyaLccVCbmh85k:V6a+pOtEvwDpjvT

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-01_3a010972aa3505a80ccb2d0ae950b854_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-01_3a010972aa3505a80ccb2d0ae950b854_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3168

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          65KB

          MD5

          3d9e0274fc996bf97c9fae939c9e88bb

          SHA1

          5ecdec7465f5b9032d0ce89c931649e3baeb901e

          SHA256

          1348ae4517a76d0562a887c5b87a4fbb6be71c2f8647f2f633293c3aa57eda90

          SHA512

          63d0db5f6c0fadb6ac1ce8bf66c94585f0e70d63ac89ffdef94bb0748112453b8cdda7aa1eb2b599fd6b3f1d11f296ef68a8c1981ff1750a204d3361e8eca69f

        • memory/852-0-0x00000000006B0000-0x00000000006B6000-memory.dmp

          Filesize

          24KB

        • memory/852-1-0x0000000000870000-0x0000000000876000-memory.dmp

          Filesize

          24KB

        • memory/852-8-0x00000000006B0000-0x00000000006B6000-memory.dmp

          Filesize

          24KB

        • memory/3168-17-0x00000000006A0000-0x00000000006A6000-memory.dmp

          Filesize

          24KB

        • memory/3168-18-0x0000000000750000-0x0000000000756000-memory.dmp

          Filesize

          24KB