Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 00:35

General

  • Target

    2024-05-10_48f613a631ffc0f71faa44f890276318_cryptolocker.exe

  • Size

    45KB

  • MD5

    48f613a631ffc0f71faa44f890276318

  • SHA1

    9607c6dd24dc87e22fd86b530027fedd8aeae05e

  • SHA256

    2e452dcf0146439850e46f87a84df931fccde460c0b81b3aaa78362dfed54581

  • SHA512

    b6e9a66a5a02a20a4a245691fc26ce2b8a3c246982c457a0b8de7e894923c03ff55b676ebb911e28e2e2942614527879d42df5995b790db4f0d6b14de75770a3

  • SSDEEP

    768:P6LsoEEeegiZPvEhHS5+Mh/QtOOtEvwDpjBpaD3TUogs/VXpAPa:P6QFElP6k+MRQMOtEvwDpjBQpVXf

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-10_48f613a631ffc0f71faa44f890276318_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-10_48f613a631ffc0f71faa44f890276318_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3700
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2544

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          46KB

          MD5

          8f0f82f0756b0019394b75d98b37a96c

          SHA1

          8b84233199b1f652e4e4ea544e9998ca419f4495

          SHA256

          b09339b70ecdc7274b8bef113052f38257d0c6ddca2d08af672fdb5f054cb60a

          SHA512

          66757a8460d0c201018a561d727831acbd81f78ce62c382dede3a6ea818dac95b29332196232264d8cccb432ca03d6cdc3d9dca4362f60376dc790296d57b91a

        • memory/2544-17-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB

        • memory/2544-20-0x0000000000660000-0x0000000000666000-memory.dmp

          Filesize

          24KB

        • memory/2544-26-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/2544-27-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB

        • memory/3700-0-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB

        • memory/3700-1-0x00000000006B0000-0x00000000006B6000-memory.dmp

          Filesize

          24KB

        • memory/3700-2-0x00000000006B0000-0x00000000006B6000-memory.dmp

          Filesize

          24KB

        • memory/3700-3-0x00000000006D0000-0x00000000006D6000-memory.dmp

          Filesize

          24KB

        • memory/3700-18-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB