Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/05/2024, 21:53

General

  • Target

    2024-05-30_fb16eb39cda452b3d404bfaaf1613c7c_cryptolocker.exe

  • Size

    48KB

  • MD5

    fb16eb39cda452b3d404bfaaf1613c7c

  • SHA1

    5e3f62d35cd23abb8319f11f6d5355ca8723b070

  • SHA256

    7d8fc34387bb4cb4d17dc2803616deacb471806af067882abe934978fb273124

  • SHA512

    852b0ccc306c582989e6a0ffc707a43a43891b32d7bac2b04079a20b16e9d729100db6de93dbc7c0691bc03826a5c1353d45a453e176c8652ebf57109e1a7fa6

  • SSDEEP

    768:79inqyNR/QtOOtEvwDpjBKccJVODvy3SpUi:79mqyNhQMOtEvwDpjBzckqSD

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-30_fb16eb39cda452b3d404bfaaf1613c7c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-30_fb16eb39cda452b3d404bfaaf1613c7c_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    48KB

    MD5

    d9dfecce7d59493f4f597c405f2beea5

    SHA1

    bbaf530332568c67c496ea7de2e9531fe8c4004f

    SHA256

    36e42ff29f176adc08f6ccf786da5beec245be07943bf2dbd6fbe3c0e230b4db

    SHA512

    80dbfd72235a6484caff8fbba40b7ad53a4a930e4c9b2caf8b3afd2a3acfa62074a0e2c74162c96cf92eba6cfda5b8a7dc85a0f39c640fd3e50df74d49bc17b8

  • memory/3444-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/3444-2-0x0000000002070000-0x0000000002076000-memory.dmp

    Filesize

    24KB

  • memory/3444-1-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/3444-9-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/3444-18-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/4928-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/4928-20-0x0000000002080000-0x0000000002086000-memory.dmp

    Filesize

    24KB

  • memory/4928-26-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB