Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 02:43

General

  • Target

    2024-05-22_9bd8b93d7d94ba82aff73e832391c2e9_cryptolocker.exe

  • Size

    46KB

  • MD5

    9bd8b93d7d94ba82aff73e832391c2e9

  • SHA1

    e3d5e4367871b57c27379eca52b0dde60182481e

  • SHA256

    51f4065ce69dcf3b56551b5a2180e1d86b0926b8e299b64666c61f5a5ac1b262

  • SHA512

    e2b7ccf5ed45818476cf65447a7ebdd87325a3b414e344bb8e40339612260e5178d48f5b282a9739787226fbb29842e9771e31b7ddf7a22a37aeba4550792024

  • SSDEEP

    768:P6LsoEEeegiZPvEhHS5+Mh/QtOOtEvwDpjBpaD3TUogs/VXpAPow:P6QFElP6k+MRQMOtEvwDpjBQpVXzw

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-22_9bd8b93d7d94ba82aff73e832391c2e9_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-22_9bd8b93d7d94ba82aff73e832391c2e9_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3100

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe
    Filesize

    46KB

    MD5

    1db0bcab1aab15ca25ade2a6dbf4fa55

    SHA1

    6915c13a0fa7e89fc222404f12f6797c5d28cb21

    SHA256

    715a2d7e1240a94d20e91263ea42fdae0cfb7750d0ed20bd57fc4d1e79c68789

    SHA512

    9cd9c0c63e964a3e4011d0b0d5880691c61996af79cda681ecc2dda87fb316cc89cae89b76981ed81313e41a1c3d74fbeff5d27f0792b79a8ff1eb62b0c55136

  • memory/2792-0-0x0000000000500000-0x000000000050B000-memory.dmp
    Filesize

    44KB

  • memory/2792-1-0x00000000004D0000-0x00000000004D6000-memory.dmp
    Filesize

    24KB

  • memory/2792-2-0x00000000004F0000-0x00000000004F6000-memory.dmp
    Filesize

    24KB

  • memory/2792-9-0x00000000004D0000-0x00000000004D6000-memory.dmp
    Filesize

    24KB

  • memory/2792-17-0x0000000000500000-0x000000000050B000-memory.dmp
    Filesize

    44KB

  • memory/3100-18-0x0000000000500000-0x000000000050B000-memory.dmp
    Filesize

    44KB

  • memory/3100-20-0x00000000020F0000-0x00000000020F6000-memory.dmp
    Filesize

    24KB

  • memory/3100-26-0x0000000000660000-0x0000000000666000-memory.dmp
    Filesize

    24KB

  • memory/3100-27-0x0000000000500000-0x000000000050B000-memory.dmp
    Filesize

    44KB