Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-05-2024 07:36

General

  • Target

    2024-05-28_fc32be17fa57cc7945da64985653abe1_cryptolocker.exe

  • Size

    52KB

  • MD5

    fc32be17fa57cc7945da64985653abe1

  • SHA1

    f5fa1790e4be63d90e09f7ceb27c22984ac4c883

  • SHA256

    78f3f4f89f5e07c291e055073ae2b8d9581e626d555c3bef1bfac6f2b8075e02

  • SHA512

    31bb5d9b08de69ab6a0ee9917cab75c7259a54bcb9b5a4786cf95662100e9d31db7cb6a6a5c4f61acbbc4a83da50178ccbd3e26e3482d4aefa6e42148e9cc0e1

  • SSDEEP

    768:79inqyNR/QtOOtEvwDpjBK/rJ+Nw8qnTHGfil:79mqyNhQMOtEvwDpjBxe8GGfk

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 3 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-28_fc32be17fa57cc7945da64985653abe1_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-28_fc32be17fa57cc7945da64985653abe1_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4200
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    52KB

    MD5

    71a5d67b6a815cbb52c605430549f691

    SHA1

    9c5158cfb458bcc69aa056a9a0bf8deed274ce22

    SHA256

    54b2039afdf5cfb212ae863c3a71c9a01f2dec554106494106296a3f116db61a

    SHA512

    91dbc1e34c3db619e05c39ba29bb2317bcdf51abb809a1db878b545eeb4f25b66ecf0ac73e10e28d622affd0c6555c30f4f0fe34f0757b69f38168f6c9891302

  • memory/4200-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/4200-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/4200-2-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/4200-9-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/4200-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB