Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/05/2024, 05:41

General

  • Target

    20240521fa6dd17406c94593b4b05bc418f91c0fcryptolocker.exe

  • Size

    39KB

  • MD5

    fa6dd17406c94593b4b05bc418f91c0f

  • SHA1

    0b3ba406dcb2e69cd74945dda455dd1e99b0c222

  • SHA256

    2b6f1415bd3c4cdef7e534d8d2be6c6b2b7120037c4eb196bb180c3be38b833d

  • SHA512

    ddc1794483a2e74358f691f856bef2c59029ee7e045bd9b43a6a2c266806595d4318a7fe82170fb5477aff33c3d427f094d1a5fa19a86cdf78916d6b5bb36cc5

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYan8j:qDdFJy3QMOtEvwDpjjWMl7Tdn8j

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20240521fa6dd17406c94593b4b05bc418f91c0fcryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\20240521fa6dd17406c94593b4b05bc418f91c0fcryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4128
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4072,i,14486271492189381216,15799931579469722648,262144 --variations-seed-version --mojo-platform-channel-handle=4552 /prefetch:8
    1⤵
      PID:4364

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\asih.exe

      Filesize

      40KB

      MD5

      187743b5ab26aacd3eeedabda4709327

      SHA1

      504c3fe8f758ee74ec4446a456f39b21ca240fa2

      SHA256

      101f21a689993a3144413afd2fe439bc5d2d5b825330eb8791ed2aa24f3eace1

      SHA512

      2d5adc4e9a549e99b239cd3e4ce4fe4f54245965413f6bf81041170b64fe0f7a01948f0d97144aa9c2d24ad932fe8a6593e65c22c4104b84bbcc43a193499938

    • memory/1204-0-0x0000000000500000-0x0000000000510000-memory.dmp

      Filesize

      64KB

    • memory/1204-1-0x00000000004E0000-0x00000000004E6000-memory.dmp

      Filesize

      24KB

    • memory/1204-2-0x00000000005F0000-0x00000000005F6000-memory.dmp

      Filesize

      24KB

    • memory/1204-9-0x00000000004E0000-0x00000000004E6000-memory.dmp

      Filesize

      24KB

    • memory/1204-19-0x0000000000500000-0x0000000000510000-memory.dmp

      Filesize

      64KB

    • memory/4128-17-0x0000000000500000-0x0000000000510000-memory.dmp

      Filesize

      64KB

    • memory/4128-21-0x00000000005D0000-0x00000000005D6000-memory.dmp

      Filesize

      24KB

    • memory/4128-27-0x00000000005A0000-0x00000000005A6000-memory.dmp

      Filesize

      24KB

    • memory/4128-28-0x0000000000500000-0x0000000000510000-memory.dmp

      Filesize

      64KB