Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-05-2024 08:29

General

  • Target

    2024-05-01_20fcf2cdbfa76a2ef48d43930151c33c_cryptolocker.exe

  • Size

    48KB

  • MD5

    20fcf2cdbfa76a2ef48d43930151c33c

  • SHA1

    bad9e6b2f298517d20f97309f6782b96283dbc77

  • SHA256

    d9bdb16f90d2b6596ce70a0b19b880e9b63cc0823fa594ad7f9acd69c39d6885

  • SHA512

    1ab64552be57a939ece6187b9bd123b13447fded332814a61771a2c6dc04ffedca09619535820cc2b5060e182a9e979e14830670d458f28229a1aa41015aa238

  • SSDEEP

    768:B9inqyNR/QtOOtEvwDpjBK/rJ+Nw8qnTb1AuU:B9mqyNhQMOtEvwDpjBxe8S1AZ

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-01_20fcf2cdbfa76a2ef48d43930151c33c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-01_20fcf2cdbfa76a2ef48d43930151c33c_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    48KB

    MD5

    252b23872a3845eb0b66796eceff29e6

    SHA1

    5514098dba7fb2533e02e3c5a820f65585611c5a

    SHA256

    d5ea0821ef8cbb11566f6f1ff04b84bcb0e5044f7402bc86eb9bc62d92ad3fd3

    SHA512

    31a8e905829e1ef74fe789eeb00d92964d08638b380cac5db719892d8a535429a93fe0b5b587926d21e0648146e47d954bcdd18c3fd86df7aed4f119505b7f89

  • memory/1880-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/1880-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1880-2-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/1880-9-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1880-18-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/3032-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/3032-22-0x0000000000860000-0x0000000000866000-memory.dmp

    Filesize

    24KB

  • memory/3032-26-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB