Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 05:33

General

  • Target

    2024-05-10_aadf20ce2229ee42dda6b1829a396918_cryptolocker.exe

  • Size

    50KB

  • MD5

    aadf20ce2229ee42dda6b1829a396918

  • SHA1

    770e5959c55a6b5d60c1104d971643006141d726

  • SHA256

    638db3fee9f051eb950c7a72638d924fed36b3c4189ff8cdd7e92869ce9739f9

  • SHA512

    ca85cc4014f0e8b943294e98dcb8fc9b46526f70c3bd9972b9bad97d4511a231f462a64c29abe128b741db6131144b792191e443e01844323640bb08c22faa30

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu55id3AMWZYO:X6QFElP6n+gJQMOtEvwDpjB0GIWiWLiO

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-10_aadf20ce2229ee42dda6b1829a396918_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-10_aadf20ce2229ee42dda6b1829a396918_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3988
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    50KB

    MD5

    b7a5bf52f5c012569edd27dcd8e01455

    SHA1

    0f5f92e64aa16670b9961f84867fbddd00410447

    SHA256

    8f5812aaf3e3a0b6579d1318b052d41ea44c4bb316b9324253f11650e1d4330d

    SHA512

    db837abbeeea269f8a817314b18ca45a4fa1347bfb37ee5afe0944e32b6a0e90735a49ad5d641d96c424339379cf424fcfc4e52044310e442af593018493b6cf

  • memory/3988-0-0x0000000001F50000-0x0000000001F56000-memory.dmp

    Filesize

    24KB

  • memory/3988-1-0x0000000001F70000-0x0000000001F76000-memory.dmp

    Filesize

    24KB

  • memory/3988-8-0x0000000001F50000-0x0000000001F56000-memory.dmp

    Filesize

    24KB

  • memory/4804-17-0x00000000006E0000-0x00000000006E6000-memory.dmp

    Filesize

    24KB

  • memory/4804-23-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB