Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/06/2024, 15:30

General

  • Target

    2024-06-07_86368acba0f22610e6ea6822560f4652_cryptolocker.exe

  • Size

    46KB

  • MD5

    86368acba0f22610e6ea6822560f4652

  • SHA1

    b02715ba0423968a39af4d24edd0176c4c3b82a8

  • SHA256

    c0f8a5080882fa32d6dd56628e606c3ce7fcc149bda973956d7f21b4cc6ec623

  • SHA512

    a2bad717dcbc12984d77e61fbc161e73324ada535897ed9a003a727b78a1f7f19c668c3bd836aae3f728cfa49f36a8ee1a70f53298cf82a0eb90208065847bde

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5aFr7YOzzfm0EXsiq:V6QFElP6n+gMQMOtEvwDpjyaYaFAh39q

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-07_86368acba0f22610e6ea6822560f4652_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-07_86368acba0f22610e6ea6822560f4652_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    47KB

    MD5

    7db51b67eb3de020c34d9962359d525b

    SHA1

    23c748b6c7f427eaffbff61b2d4b5d1e445056ce

    SHA256

    38e74c1cd066b98a4191bdc3b2551848679eb34c9fd05876d250c8453bda1e11

    SHA512

    aeeabc697d8498dc4e0ec09ef1417db2e50356b06cf772f7db661b4a379012276cf78b14348d79c84d59a877f7f00507e277f6a79afcb229a455a2b0fe407584

  • memory/544-17-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/544-23-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3016-0-0x00000000020E0000-0x00000000020E6000-memory.dmp

    Filesize

    24KB

  • memory/3016-1-0x0000000002100000-0x0000000002106000-memory.dmp

    Filesize

    24KB

  • memory/3016-8-0x00000000020E0000-0x00000000020E6000-memory.dmp

    Filesize

    24KB