Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/05/2024, 16:28

General

  • Target

    2024-05-28_66ef7c14082304efe02091ea03aafb67_cryptolocker.exe

  • Size

    45KB

  • MD5

    66ef7c14082304efe02091ea03aafb67

  • SHA1

    6c21aea174684f1fe8f96e3ac16a83d60fc187d4

  • SHA256

    6ff1b0dc1812b76dccb26f0dcc3fc48dce138395bc399afe721a176a4d48d708

  • SHA512

    1c39d06b1cad9ff9d87af56d8618862eb2e00c421097601db6e2e21f20babccbf6505531921f1765d85161cbbb0d6f78ea0e7bf2a69d7f5df4f6c06e9e63ab87

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFHuRcD9E:X6QFElP6n+gJQMOtEvwDpjBmzDkWD6

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-28_66ef7c14082304efe02091ea03aafb67_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-28_66ef7c14082304efe02091ea03aafb67_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1392

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          45KB

          MD5

          d375c1a035374e1d9333ef2860ed8a03

          SHA1

          641904b91daf67daab4a99f9a203ac6b89e45d60

          SHA256

          cb88aec2012e90d0f6c9fbb0132a02fcf627aaea5665165552e5cf78f0c7e802

          SHA512

          6b6a75464e6a0ee5f0be3e480b922d6d187933f956b742c008e7e518673c2a07a6332b12bba52e941973667db1fc004b6c2e0ceae4154b06ca89dbaebf9128b1

        • memory/1392-17-0x00000000004F0000-0x00000000004F6000-memory.dmp

          Filesize

          24KB

        • memory/1392-23-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/2360-0-0x00000000007B0000-0x00000000007B6000-memory.dmp

          Filesize

          24KB

        • memory/2360-1-0x00000000007D0000-0x00000000007D6000-memory.dmp

          Filesize

          24KB

        • memory/2360-8-0x00000000007B0000-0x00000000007B6000-memory.dmp

          Filesize

          24KB