Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 21:52

General

  • Target

    2024-05-09_3b89a259a0bdb17dd8cc0223ca5f9dd6_cryptolocker.exe

  • Size

    75KB

  • MD5

    3b89a259a0bdb17dd8cc0223ca5f9dd6

  • SHA1

    f76ca7c73ed5d639888197707f450b187e567ac6

  • SHA256

    d9dd5c76de3d6d2fe2e1bbbd92984b5c88957153a2c3ef5660cbd308e02116d7

  • SHA512

    8e91924e75c90e578067436fd22dcf6bb0a3f564c736155c5f240bb1b372cef97e2d2279d174bc0068a11153592d7f8110b10214c1a91bf096434e66f7f2c5d7

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1rHsS:X6a+SOtEvwDpjBZYvQd2B

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-09_3b89a259a0bdb17dd8cc0223ca5f9dd6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-09_3b89a259a0bdb17dd8cc0223ca5f9dd6_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4948
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    75KB

    MD5

    4b3ab6a67acc4da8f28e42081cb39a9e

    SHA1

    386188dd1467c8a5e3a4de4d874d86fe03beb4c5

    SHA256

    c295a70a207a851b3d303123cec4da91a4a0bfd443e0dec311fbfd004624f710

    SHA512

    e2266548d84f53fbd7d519ac40b4eed104c3b24de835d921a6f6f2d8b8bfb7b3681782c95b5f4a74cc6664868535c59c1d55112bc1c7aaa0168c6ce7d6ff1338

  • memory/732-17-0x0000000001F80000-0x0000000001F86000-memory.dmp

    Filesize

    24KB

  • memory/732-23-0x0000000000490000-0x0000000000496000-memory.dmp

    Filesize

    24KB

  • memory/4948-0-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/4948-1-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/4948-8-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB