Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-06-2024 04:44

General

  • Target

    2024-06-05_afece5aa0d935567c650b1c4525f14c3_cryptolocker.exe

  • Size

    74KB

  • MD5

    afece5aa0d935567c650b1c4525f14c3

  • SHA1

    b91cddb028b59bd212e839bf6bfd84c6241b17c6

  • SHA256

    b9aac144b90f9ef86e620fe73aa4ee72e13cae03d6963d8618f1932969266212

  • SHA512

    ff7b74165f60b61f61cde912e53a77d1627472ce879b17e8a45db42a4a3c042f818b5c632a3fccabc80af92cb148d72a07cf3280cfd464413a3603b1af751ce0

  • SSDEEP

    768:u6LsoEEeegiZPvEhHSG+gZgtOOtEvwDpjeY10Y/YMsMq:u6QFElP6n+gWMOtEvwDpjJGYQbV

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-05_afece5aa0d935567c650b1c4525f14c3_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-05_afece5aa0d935567c650b1c4525f14c3_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4044
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    74KB

    MD5

    eea5793cbf899032ce545001fd3bf041

    SHA1

    205f0e8563914801744ac2f0921a63ea3a7a7649

    SHA256

    2e1e693f40417f74141af2192f93301e379817e144ccf9a1fc609440ad5dba8b

    SHA512

    9151c03ebf52ffe82a559467bba1f0e1510e4feeecb4e7fdc308733e99911bd4efefedb5b254970b205acc9209487d79ae0be36e7462856ce5ba6a6b2008456b

  • memory/764-23-0x00000000020E0000-0x00000000020E6000-memory.dmp

    Filesize

    24KB

  • memory/764-17-0x0000000002100000-0x0000000002106000-memory.dmp

    Filesize

    24KB

  • memory/4044-1-0x00000000007D0000-0x00000000007D6000-memory.dmp

    Filesize

    24KB

  • memory/4044-0-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/4044-8-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB