Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2024, 00:42

General

  • Target

    2024-05-20_81ff8ff918692b52da59976913222343_cryptolocker.exe

  • Size

    77KB

  • MD5

    81ff8ff918692b52da59976913222343

  • SHA1

    bc4e1d9d705c1d5b592d1d8e5862ebc3a50cf623

  • SHA256

    2295ad673c7e18c663fbce41a7b1a592a19db4a88936bf4ce9894382ec592188

  • SHA512

    bbf10a26e0c9bea065217d16ed78d40ce8d756f976301008c726e97da3c9ee17c82d345b1bb98ec142ed499403c73a3909e095989890212a713a98404ecb06ef

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxD:T6a+rdOOtEvwDpjNtHP8

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-20_81ff8ff918692b52da59976913222343_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-20_81ff8ff918692b52da59976913222343_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    78KB

    MD5

    97dba261f00e46cea1b1ab4ca988a3c2

    SHA1

    61d8b90ef6702cfe6c4a1855489764f48e92d7cd

    SHA256

    86ee771676eda4a4ca7f54d72e35c76bf265c24f4ef91fbc5247dd4195c93121

    SHA512

    fad81f71860d803955d2523d4101ff242e860b3dd7dd7ab4fa422099068bbb2bc75887824abd96e404bc3d5dc54f0f75779de887b87bb462e900df22c72b215c

  • memory/1112-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1112-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1112-9-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1112-2-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/1112-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1424-18-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1424-26-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB