Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 11:30

General

  • Target

    2024-05-09_34f29e54b3e7e9123b569143e3ff1ae6_cryptolocker.exe

  • Size

    57KB

  • MD5

    34f29e54b3e7e9123b569143e3ff1ae6

  • SHA1

    649a990a3bceeec1d8c9b933f6725469b9ce5311

  • SHA256

    cbb1da37eb2ba4655c5aad4e09bd514f9764b8f88dbf0c5887689da4b5486c5a

  • SHA512

    66dd002570893996d5edbad41ef5ecfeffaa9bbdd2228a40a8c8d94f1778b3196bbda28ed671f28bdb7d2439a998913fceedbe308b78f7052b4202e7cd94775b

  • SSDEEP

    768:79inqyNR/QtOOtEvwDpjBK/iVTab3GRuv3VylsPQQWTa/2wGE:79mqyNhQMOtEvwDpjBPY7xv3gy9WTAcE

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-09_34f29e54b3e7e9123b569143e3ff1ae6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-09_34f29e54b3e7e9123b569143e3ff1ae6_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3712

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          57KB

          MD5

          11de5bb7f9456752a30eaa8f0f043407

          SHA1

          bb4197a81728b681aa4d6aa2fe1c83ff2187a472

          SHA256

          55bf6874e3014834e8a7fe9286dfc5a6d11b16db3cae1bae0102e5a1c581d7da

          SHA512

          7be0e27cbab9ec0c81994c8a001258b8dc2093088374a55ff4320ef6089fe5d24eb22e84f76ab567599dd9b2430a715e10e68a57e515519f7120fd86207d6951

        • memory/3012-0-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/3012-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/3012-2-0x00000000004F0000-0x00000000004F6000-memory.dmp

          Filesize

          24KB

        • memory/3012-9-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/3012-17-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/3712-18-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB