Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 22:26

General

  • Target

    2024-05-22_38640093143e2352527195b0ea471baa_cryptolocker.exe

  • Size

    77KB

  • MD5

    38640093143e2352527195b0ea471baa

  • SHA1

    7d3ddec04623b65e1079fa5ba0b35b55d0847981

  • SHA256

    a3d12b0f2a5198edeab28db81962ad1e2e23e33ae0c0c9ce9d477c29803626df

  • SHA512

    3be367bc7ab962eec19e4d383bd69ea0a183e81cd56f7a6da3ea072dd6cd0071d0673f7e98c51dd6153181850733406a1c1b1c7fd7bda3821ec11f91d06d216e

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1rHsoLkd:X6a+SOtEvwDpjBZYvQd2u

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-22_38640093143e2352527195b0ea471baa_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-22_38640093143e2352527195b0ea471baa_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    77KB

    MD5

    689301c7b635ff93cf9cc75b989140e4

    SHA1

    739be8aa89d0258a61a6d08a2c011bd31e75c708

    SHA256

    2e4f2eb5ab56f2b8f639ec9a81a4e227dfc300af79952f02a750e56b24bf8446

    SHA512

    ceeac42faecee6ce1c35032789d5748a6f21823644a1cdc530e03e523757d68a77f70d1a532962371c31791050a7611a4d3b0192c56246c9256088a7159cffad

  • memory/1140-0-0x0000000000490000-0x0000000000496000-memory.dmp

    Filesize

    24KB

  • memory/1140-1-0x00000000006E0000-0x00000000006E6000-memory.dmp

    Filesize

    24KB

  • memory/1140-8-0x0000000000490000-0x0000000000496000-memory.dmp

    Filesize

    24KB

  • memory/3304-23-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB

  • memory/3304-17-0x0000000000650000-0x0000000000656000-memory.dmp

    Filesize

    24KB