Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 00:44

General

  • Target

    2024-05-23_41587a3b9b14e1abc6b6afc019c07525_cryptolocker.exe

  • Size

    41KB

  • MD5

    41587a3b9b14e1abc6b6afc019c07525

  • SHA1

    93ae2c0b535581dbaca624f673128b448f386d58

  • SHA256

    3bef42cf8c6f87c7b4a51d4e566d34a980aac8545664c4f6c4b5723d1514c40f

  • SHA512

    12743e4fcc56af94d9e2785e7f0c41d1c025b185d2a62d14298854dab1ea7ee74f60b4bd5618639ceb91eb80605864d4beac0a18f9c49cfb430f1ded336ea37f

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaac4HKcfr9Orj:X6QFElP6n+gJQMOtEvwDpjBsYK6r0rj

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-23_41587a3b9b14e1abc6b6afc019c07525_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-23_41587a3b9b14e1abc6b6afc019c07525_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3940
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    42KB

    MD5

    57ee2cb2561a6e6d1b4b05e092ecb94a

    SHA1

    bee0eab8f703b8f92fe0e6c2dae627678faae9b6

    SHA256

    3d86ecd1e1c541263ba7fee660e56a99e4d6fa085a5c20d776de67865b38a612

    SHA512

    7cdd8841ccff872774a8039c4169b7bcef47f52eb5b647db5ee7bf0ca66ce2e4dbf161dda9eee5282c879972f1d11036654e0ef2d9333f38172c2439f8f923ec

  • memory/3940-0-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/3940-1-0x0000000002080000-0x0000000002086000-memory.dmp

    Filesize

    24KB

  • memory/3940-8-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/4576-18-0x0000000002060000-0x0000000002066000-memory.dmp

    Filesize

    24KB

  • memory/4576-17-0x0000000002140000-0x0000000002146000-memory.dmp

    Filesize

    24KB