Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2024, 10:38

General

  • Target

    2024-05-14_931caf575bc3a80249f338e3d9816da8_cryptolocker.exe

  • Size

    48KB

  • MD5

    931caf575bc3a80249f338e3d9816da8

  • SHA1

    765e50482aa3ba5eba8d4a7d22ec4eaf098a54a0

  • SHA256

    f484d61ade65428083d57e630dfd09b3f6c5086cbca63bcfff601eca25fab2cd

  • SHA512

    6bafd50dd304fbfed5cc713a90e1796e77b7ab7755890de4f59fc1d42dd95101dace7a7b69d2b744fa1860d3860df753a6f65d7aa32ff16e5c24195151648de5

  • SSDEEP

    768:P6LsoVEeegiZPvEhHSP+gp/QtOOtEvwDpjBBMLZdzuqpXsiE8Wq/Dpkc8:P6Q0ElP6G+gJQMOtEvwDpjB8WMlf8

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-14_931caf575bc3a80249f338e3d9816da8_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-14_931caf575bc3a80249f338e3d9816da8_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3964
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    48KB

    MD5

    842beaf99d4c93b8f486866c09d2c5fd

    SHA1

    5073d2509f733253478b3b62f02e8cc2c4cbdcae

    SHA256

    d9beee3fce36c4e0bcf5bafc452f8a4e0e023ffe05d4791522f77ca963c772ef

    SHA512

    a04ba164cba49abe6eea99071fa25d29e9966ffc29343f77db3b94aa04b1906c25d39647c5f96de1983b4c5889ca0d4f68c7e6e5f38c1944a267501e69fa8888

  • memory/3464-19-0x0000000000750000-0x0000000000756000-memory.dmp

    Filesize

    24KB

  • memory/3464-25-0x0000000000730000-0x0000000000736000-memory.dmp

    Filesize

    24KB

  • memory/3464-26-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/3964-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/3964-1-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/3964-2-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB

  • memory/3964-9-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/3964-17-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB