Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-05-2024 06:25

General

  • Target

    2024-05-29_1570972f230a7217f54201f169b17172_cryptolocker.exe

  • Size

    74KB

  • MD5

    1570972f230a7217f54201f169b17172

  • SHA1

    5afd69ecd3abce10251c47fe06ba4275cb9fba21

  • SHA256

    37b6208e4be164cc638d65c3bf00213eadbf5b215d286ac868ef1bcbd491c6c3

  • SHA512

    e9f2081dd7668014b40cb2aa755e668f7961963829eb63a800a77394d12621488b86af0f8e1059343a72218e963f4fb6c1cc753194783011023359a372d2c3c3

  • SSDEEP

    768:u6LsoEEeegiZPvEhHSG+gZgtOOtEvwDpjeY10Y/YMsPO:u6QFElP6n+gWMOtEvwDpjJGYQbG

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-29_1570972f230a7217f54201f169b17172_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-29_1570972f230a7217f54201f169b17172_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:208
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    74KB

    MD5

    6802eb83dda19f5d0ba2821650dc0869

    SHA1

    e502c42c85b8bb84a2827ac1f73460acf99d60af

    SHA256

    e26c0684774c8bde7ab71852ba4eed0ff4afc6db365bd3f49ef14692082081e9

    SHA512

    64c434994c93a1b3ecb4f7fdf2a65d8626d9f98e02b6e2a6471f1b1c43784651dee3c6f45a46174b2f62302c1300f1452735f312770de3bfcf09394c77c957d4

  • memory/208-0-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/208-1-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB

  • memory/208-8-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/2344-17-0x00000000006E0000-0x00000000006E6000-memory.dmp

    Filesize

    24KB

  • memory/2344-23-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB