Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/06/2024, 16:09

General

  • Target

    2024-06-12_fe63a9819b20d3f760f8ea7ad462fab7_cryptolocker.exe

  • Size

    76KB

  • MD5

    fe63a9819b20d3f760f8ea7ad462fab7

  • SHA1

    344400a792d4110c104a0f0c4601d2f91daf1812

  • SHA256

    f128537f5de7f5961b2b81521d4ee970bed5c0ad400b11ebcf8c83adbb7cbea0

  • SHA512

    4c030160a95805c97a2fd1c976eceffd0ff827e1eb3473f078808fd0c59fbe5e6e914d3e707eb1734b6412ed6ce1c805cf60a2921330028705269b46f7f3018b

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1rHsoLkx:X6a+SOtEvwDpjBZYvQd2q

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-12_fe63a9819b20d3f760f8ea7ad462fab7_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-12_fe63a9819b20d3f760f8ea7ad462fab7_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3192

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          77KB

          MD5

          79459e488f35fb8b1a321d90a189fcc7

          SHA1

          b653648d848d2987089d4cab2a990bc6496b60e2

          SHA256

          c02807dce7afcbd44b6e5741a795078cf9a3932e49a65f863c50e9f26dedf3f1

          SHA512

          5d3e91eb0fa92a02f249ef0548d0ca3e7a6bb90f1b87ff960bf16678c36b10edc80f850ebe9a902f60dd81ea94a3229155d75323228b11dac282208fad3f8f1c

        • memory/2560-0-0x0000000002050000-0x0000000002056000-memory.dmp

          Filesize

          24KB

        • memory/2560-1-0x0000000002070000-0x0000000002076000-memory.dmp

          Filesize

          24KB

        • memory/2560-8-0x0000000002050000-0x0000000002056000-memory.dmp

          Filesize

          24KB

        • memory/3192-18-0x0000000002040000-0x0000000002046000-memory.dmp

          Filesize

          24KB

        • memory/3192-17-0x0000000002140000-0x0000000002146000-memory.dmp

          Filesize

          24KB