Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 05:27

General

  • Target

    2024-05-12_61870e78e62a15111cdc239bae6a3b92_cryptolocker.exe

  • Size

    51KB

  • MD5

    61870e78e62a15111cdc239bae6a3b92

  • SHA1

    faf234bfba6b93693fa891824b92e5595d07ae2a

  • SHA256

    c007da949c3fb75ebc64dc5f1845a98fad80220a0ce7522a345b3cb25bc6bb32

  • SHA512

    24c6c0ee537030b84af22f7f3aaafd0220713f6de417c57321c32c9c7a2569d6db59e013f41ae7b921f60a749121fb497b288fafece07f12e7293aaa122e7acb

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu55id3AMWZp8o:X6QFElP6n+gJQMOtEvwDpjB0GIWiWLp

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-12_61870e78e62a15111cdc239bae6a3b92_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-12_61870e78e62a15111cdc239bae6a3b92_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4508
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3968
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3804,i,15140928051103392835,1612840580898364401,262144 --variations-seed-version --mojo-platform-channel-handle=4120 /prefetch:8
    1⤵
      PID:3376

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\asih.exe

      Filesize

      51KB

      MD5

      eece0b9137e2dd6666ae97625495bb72

      SHA1

      c8ce0529e2526bbbd5612ac1e3e5757e2e506d3d

      SHA256

      e8b246a3458e4cb5fa8123d65186ef204d97176e27b4ba6e57df0e5d2a10c8c7

      SHA512

      957dddb38b3a5503c940fad068f8c8a4f37f8aada2f42c768c1b575c091c23296a137bee7b8b0331bd80cda8e59e3a74a74384ca6c222d7b448f5fcb62df81a0

    • memory/3968-17-0x0000000002090000-0x0000000002096000-memory.dmp

      Filesize

      24KB

    • memory/3968-23-0x0000000000690000-0x0000000000696000-memory.dmp

      Filesize

      24KB

    • memory/4508-0-0x00000000004E0000-0x00000000004E6000-memory.dmp

      Filesize

      24KB

    • memory/4508-1-0x00000000005E0000-0x00000000005E6000-memory.dmp

      Filesize

      24KB

    • memory/4508-8-0x00000000004E0000-0x00000000004E6000-memory.dmp

      Filesize

      24KB