Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 19:25

General

  • Target

    2024-05-21_2a8266c5251598d14a57dad9a69d5dee_cryptolocker.exe

  • Size

    64KB

  • MD5

    2a8266c5251598d14a57dad9a69d5dee

  • SHA1

    69b63824244c26d5834843ac93f6187a8ea16775

  • SHA256

    030265b0ed84d026b8f62d77d83a15df60c1af08fd98674a2888733f1ca4d126

  • SHA512

    1762d2a703f42718541a8e4a3cae4f9ddd04c3dd6c04e58f1a9bfe7fb36e7177f1987f041f8279306da84a78ee274cbfe5e9d6417414fa9a37e2ed6bab925d83

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiQ:BbdDmjr+OtEvwDpjM8p

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-21_2a8266c5251598d14a57dad9a69d5dee_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-21_2a8266c5251598d14a57dad9a69d5dee_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    64KB

    MD5

    554ad6551f70526915c48edf29ecbaca

    SHA1

    8c5f2f847e1c9597225a1dbb51a3bc56fc575698

    SHA256

    ffab661a7ce0d5f2cb35980a0d19e62ac9adb4a4b90af2b247c9fec61acafa86

    SHA512

    ecd47a6ea8150dc5e93263a0d1979bf286a7078e8615f65f615ff811de18617d9e2999f2a6ea525f3009af6729df3260f52f0736e74c49cc85a03078938f7ec8

  • memory/856-18-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/856-27-0x0000000000670000-0x0000000000676000-memory.dmp

    Filesize

    24KB

  • memory/856-21-0x0000000002000000-0x0000000002006000-memory.dmp

    Filesize

    24KB

  • memory/856-28-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2796-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2796-1-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/2796-2-0x00000000007E0000-0x00000000007E6000-memory.dmp

    Filesize

    24KB

  • memory/2796-9-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/2796-19-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB