Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-05-2024 03:55

General

  • Target

    2024-05-03_c522543a558331ad5dbbcadf0e65b730_cryptolocker.exe

  • Size

    96KB

  • MD5

    c522543a558331ad5dbbcadf0e65b730

  • SHA1

    ca2ff5c034fd213f08e14d9d314fe6f3e9b86e81

  • SHA256

    f58935a8c3e9964ce8dd492c03b4913d83b860deeeba39e92ccd3183fc6ec1b5

  • SHA512

    a701588188dc679e0055e695e4dfc18e5b3de3462a91e31490ddb40847c79f004378281ff174cc3ee15f71971e9e42db9bbbdb20a3c2c92b2ee8b5117d98c61c

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNgp0B:V6a+pOtEvwDpjtz5

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-03_c522543a558331ad5dbbcadf0e65b730_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-03_c522543a558331ad5dbbcadf0e65b730_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    96KB

    MD5

    646b57eece679654307a19c2d13b4f48

    SHA1

    7364fdde90e1e999d3eb9354050f73e093e488fe

    SHA256

    ccb28653001b57a06c7bfbb97ba3fedf51831a0e36ec5ad447a5aefa138dfa9c

    SHA512

    dc956ab2a4ce233848ae2141f1b1abbddd1ef13117a6de254cb31c9ed78b4835a1fa3ed69034757b8e6223ebaa376646a03015e57032f5b7534740645d30b0f4

  • memory/1128-0-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/1128-2-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB

  • memory/1128-8-0x00007FFD9E270000-0x00007FFD9E465000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-17-0x0000000002070000-0x0000000002076000-memory.dmp

    Filesize

    24KB

  • memory/3928-23-0x00007FFD9E270000-0x00007FFD9E465000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-24-0x00007FFD9E270000-0x00007FFD9E465000-memory.dmp

    Filesize

    2.0MB