Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2024 02:32

General

  • Target

    2024-05-26_6e16e4939eaf664afa43e691b7624991_cryptolocker.exe

  • Size

    53KB

  • MD5

    6e16e4939eaf664afa43e691b7624991

  • SHA1

    44f39d929b58c6ec0f9ca8f8fcc54f249a9ac0cf

  • SHA256

    2a9dbf4ade1d5489ced900a00864e0f8413fa7c3dcb693af17b3360fd5193cb1

  • SHA512

    2df5e4193a754a0f249c36b576e8ff3eef52aa085914cc932d4886f9e0b569f7412ed7cbad46430839bb9ad9671b695590e8809616124ea223c8d3c41a127fa8

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjeJQ7pojaklPsC:V6a+pOtEvwDpje

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-26_6e16e4939eaf664afa43e691b7624991_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-26_6e16e4939eaf664afa43e691b7624991_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    53KB

    MD5

    2cdedc3148f71ab6687417cbd2e89b94

    SHA1

    afa389cc45d6a14dbd14b9a8a90c6ed896836086

    SHA256

    d7699323f577d690e6dd36f154902ea15f9b3f3d832a59bc8774f21cb7ff3fd1

    SHA512

    0a0934640c3e2f4e26b5a7d0804cadc8f550e1b5ad2c0fe749ccd8e08439212679bfcc280b9bd911ad7263f8afd96c5b0aaef567c3f9255b3a2bd9238037a88a

  • memory/2880-8-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/2880-1-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/2880-0-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/4832-17-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/4832-23-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB