Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/05/2024, 18:43

General

  • Target

    2024-05-21_9491d7d55e1552c74695ee8a6261cc39_cryptolocker.exe

  • Size

    50KB

  • MD5

    9491d7d55e1552c74695ee8a6261cc39

  • SHA1

    150764d6bb21ab634cc5ceb525e37646aad4b1c7

  • SHA256

    04691a9de01210a6b1559ebf6083f23a4581218f4c31a8a45e77ab54d4793a68

  • SHA512

    8c1ac708f83a88e46409139d3b30253b7b9226038702f71ee719724d9060222a83dd231611de5946edf1104e7b74360a4ad8c023eb9eb9d8ebeef997c009add1

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu55id3AMWZUD:X6QFElP6n+gJQMOtEvwDpjB0GIWiWLqD

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-21_9491d7d55e1552c74695ee8a6261cc39_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-21_9491d7d55e1552c74695ee8a6261cc39_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4984
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:5016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    51KB

    MD5

    73f1e5860f09722c23560544bdb746f1

    SHA1

    026faff954a9063fd678ca3272a3360c2749b6db

    SHA256

    8a61b6746bfb682aa31bef013e16a192cf11e5d4180cc778dfa029c88614a486

    SHA512

    56d5ecf6d865f63191a4f033ada8403d5f2ddb5741d7d16cd6d2e3673986404188d77886da3463946a4046714f6557306a6b9a9e55174a2279ef4fb2665c423d

  • memory/4984-0-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/4984-1-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB

  • memory/4984-8-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/5016-17-0x0000000000640000-0x0000000000646000-memory.dmp

    Filesize

    24KB

  • memory/5016-18-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB