Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 09:33

General

  • Target

    2024-05-10_cd92bf0e0c7a2a8cfab75b7208e4a97b_cryptolocker.exe

  • Size

    88KB

  • MD5

    cd92bf0e0c7a2a8cfab75b7208e4a97b

  • SHA1

    f3b688aed640a7bb8c4940a5db89595b3ee3c60a

  • SHA256

    46aa7d0ba35a4d5bb3dc02b5fe0c1a0371574225dc270b8d1b250a2acaa83df5

  • SHA512

    75fb8ea054e6e51dfbd16b3a005efad3d9bdd4413179dec0505b55396fdb3f394ade69e7238775d4b44dc3c359a17f6f03111bf21b43a8d3f03b00e7d1c453de

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQA+:n6a+1SEOtEvwDpjYYvQd2P+

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-10_cd92bf0e0c7a2a8cfab75b7208e4a97b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-10_cd92bf0e0c7a2a8cfab75b7208e4a97b_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    89KB

    MD5

    a60f59f69ba4759f7f04e013d3b0b921

    SHA1

    e1f3ffe24aefd9acc1140400d792ae4a69e5b0f5

    SHA256

    bc1e427cff9ea59428edff3146e40a187f6286bc569dbaba7f37d54ed3297f47

    SHA512

    9a32f3ba5569777d864b8d522663b11d972dc6a6d06ea32ce6bf5e5229642cd91932f39ca6e7b304bd2a1fa0473f2c0b54df744a4120ff91c8f20d0f1b26543d

  • memory/1956-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1956-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1956-2-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB

  • memory/1956-9-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1956-19-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3364-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3364-20-0x0000000001F40000-0x0000000001F46000-memory.dmp

    Filesize

    24KB

  • memory/3364-26-0x00000000021E0000-0x00000000021E6000-memory.dmp

    Filesize

    24KB

  • memory/3364-27-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB