Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/05/2024, 04:30

General

  • Target

    2024-05-21_183f18d169f8da257355a20a3b56eb5c_cryptolocker.exe

  • Size

    47KB

  • MD5

    183f18d169f8da257355a20a3b56eb5c

  • SHA1

    579c01e35b65df5f9b37997e15e3f7713f3497da

  • SHA256

    db98672612606e7e8447399db1a02943fedcfb57a2640a81c2ea2a53f62d5439

  • SHA512

    ce439a030a48b39b79d934fb23f9ee4df9797755dfc50cecd96a97f95c9a9cc32d1017b680c2b52a58a715e7cff64df8cf45b816fd5681d5220f0394ab55eb50

  • SSDEEP

    768:P6LsoEEeegiZPvEhHS5+Mh/QtOOtEvwDpjBpaD3TUogs/VXpAPyr:P6QFElP6k+MRQMOtEvwDpjBQpVX3r

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-21_183f18d169f8da257355a20a3b56eb5c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-21_183f18d169f8da257355a20a3b56eb5c_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4312
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4492

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          47KB

          MD5

          514f266350a9b2b6e28dc6a9b01ced0c

          SHA1

          3831c0d3056b1b1d04b4383847fe28d0bf9355cf

          SHA256

          bdef543aec1e96417f1e291b5da0cb691ba90ecb818f810fa482bdde6092fae5

          SHA512

          8f7235fe200d76602fb43e38109462805ddb589946375442a5091e75f01ebc7784289bb67004c32fe2baaf620032a62cc0a1949f8c8d1d1a776bb613b2cf71d6

        • memory/4312-0-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB

        • memory/4312-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/4312-3-0x00000000004F0000-0x00000000004F6000-memory.dmp

          Filesize

          24KB

        • memory/4312-9-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/4312-19-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB

        • memory/4492-17-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB

        • memory/4492-20-0x0000000000670000-0x0000000000676000-memory.dmp

          Filesize

          24KB

        • memory/4492-26-0x00000000004E0000-0x00000000004E6000-memory.dmp

          Filesize

          24KB

        • memory/4492-27-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB