Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-06-2024 20:39

General

  • Target

    2024-06-08_8190320cb80e82e3578214201fec0368_cryptolocker.exe

  • Size

    87KB

  • MD5

    8190320cb80e82e3578214201fec0368

  • SHA1

    475c3f3435e822764d3b958ecc7626702a5b8ab1

  • SHA256

    c36fc885bfc6cd58be2c1a8fdd6d64877420ca9f2ef36b5fe9f864300daf7898

  • SHA512

    c933c597189e319fb3158c590e26560e568025bf8e45c265a7488bd8a191ded3d4e8ad64576947277b6a65b0653a2147935f002736475684e87aae3848da9c53

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjyaLccVNl6a5:V6a+pOtEvwDpjvp9

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-08_8190320cb80e82e3578214201fec0368_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-08_8190320cb80e82e3578214201fec0368_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1296
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    87KB

    MD5

    cd14b8a33ea32b17f68a72fc277f79a0

    SHA1

    c31b35096f9dfc53698c9d69a557f90ecb6d3097

    SHA256

    1f1e0b06288f56cab5f71222c2c7ff3c9a22506028b70817bb91bfc2da0d1ded

    SHA512

    b68572f2b2788eae255a50d9e8d9ba2d66e883b8759b507cb0ae0999d6cc063b2c89a893f57da2fa03c3c69282bc51050624d7f4b55c0ec1068b2b538adb7f12

  • memory/1296-0-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/1296-1-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB

  • memory/1296-8-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/4120-17-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/4120-23-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB