Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/05/2024, 05:40

General

  • Target

    20240521e09f161867cfee34a6e77462c8304e4ecryptolocker.exe

  • Size

    47KB

  • MD5

    e09f161867cfee34a6e77462c8304e4e

  • SHA1

    c6c345d2546387d3d4bdf92360dc0795caadccd8

  • SHA256

    b509804f3e3aae361b1ef58871380dea3fbd941adb23b50eba98b431dfe0958a

  • SHA512

    5aaa4967c38fd116ac98107dd806c9f888cec9c1fff112bbfd92aa9edec9b5dc51af49969ff3840eeb4f8f2ea02c70bfdf704a4a883bd4140d915578904d8678

  • SSDEEP

    768:P6LsoVEeegiZPvEhHSP+gp/QtOOtEvwDpjBBMLZdzuqpXsiE8Wq/DpkcL:P6Q0ElP6G+gJQMOtEvwDpjB8WMlfL

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20240521e09f161867cfee34a6e77462c8304e4ecryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\20240521e09f161867cfee34a6e77462c8304e4ecryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4784
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    47KB

    MD5

    7d55db87d20f5218ce46519aee04b083

    SHA1

    1d3b27a8eb88bc42cc2a9fb899510d63ecd00c2d

    SHA256

    b06d013e3bb59d85f1ba7a94aa479b5bdd011f377e91d32e88f1f202ee279a76

    SHA512

    e899b48e21c0003b73f6322422fa1c016561ce67d21d6ab5c4ef3115290031bc94fd65a13850af3ec50756bb596e139440028e04d1940651582b50fd80cc98a7

  • memory/4104-18-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/4104-20-0x0000000000860000-0x0000000000866000-memory.dmp

    Filesize

    24KB

  • memory/4104-26-0x0000000000830000-0x0000000000836000-memory.dmp

    Filesize

    24KB

  • memory/4104-27-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/4784-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/4784-1-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB

  • memory/4784-2-0x0000000000650000-0x0000000000656000-memory.dmp

    Filesize

    24KB

  • memory/4784-9-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB

  • memory/4784-17-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB