Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/06/2024, 15:50

General

  • Target

    2024-06-19_dbab711ff5dbc733049e23c3f1cbf407_cryptolocker.exe

  • Size

    44KB

  • MD5

    dbab711ff5dbc733049e23c3f1cbf407

  • SHA1

    20d4d1e72904ff1dbb0984d9229a01ca923f15a1

  • SHA256

    2c5071f8ca33c423e4307f89fb46236fb6a9ae970102ddf58fa2504c531e88aa

  • SHA512

    1e8851862ad1cdea9c5a65a85e1945e910e279dd5ff6e664b4286a5bda5fb21cc5b1f73d8f2d7d1934070beb782fe69015ee3616d27bd93ac2cf6c0b8392a575

  • SSDEEP

    768:P6LsoEEeegiZPvEhHS5+Mh/QtOOtEvwDpjBpaD3TUogs/VXpAPn:P6QFElP6k+MRQMOtEvwDpjBQpVXK

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-19_dbab711ff5dbc733049e23c3f1cbf407_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-19_dbab711ff5dbc733049e23c3f1cbf407_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:728
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    45KB

    MD5

    572fe9677c4c36763aa91cf6f01a0894

    SHA1

    709cc96496a2d5895e7f703837011edc0768cac4

    SHA256

    ce329a4aa725269141ce9e56d58a845588a090f316b39fb983afcc9bc6ca5217

    SHA512

    04dbab8acacab531d21b3e4c23f2be6903e19dcb306327bcbc3a67d0be869b10774e611a763fd67957264fc025af5d42c1108cab2da34810973379855f4a5521

  • memory/728-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/728-1-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/728-2-0x0000000000590000-0x0000000000596000-memory.dmp

    Filesize

    24KB

  • memory/728-9-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/728-16-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/4820-19-0x0000000000670000-0x0000000000676000-memory.dmp

    Filesize

    24KB

  • memory/4820-25-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/4820-26-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB