Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 14:24

General

  • Target

    2024-07-09_dff9e1fdc91aee321b16cdb286b5db87_cryptolocker.exe

  • Size

    49KB

  • MD5

    dff9e1fdc91aee321b16cdb286b5db87

  • SHA1

    db5655441ede1a080e864ff85e39f52b9fadd8b5

  • SHA256

    60e5d544749e895b1cb5a7d4b721a0d4ab4f06fc77c671b9768b66dd2f5cbbff

  • SHA512

    173a23f1cac2552783dc76f22acfc3271546a3076bce274b2fa67b3cb6d1bf7162123de1df32f529d4e61578c6a7936e1f1703d8a8c1e4db63aff6c5abff1b6c

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu556BlvsTN:X6QFElP6n+gJQMOtEvwDpjB0GIWSlvIN

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-09_dff9e1fdc91aee321b16cdb286b5db87_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-09_dff9e1fdc91aee321b16cdb286b5db87_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    50KB

    MD5

    224e2ff77eadf2028d8e3aea822f7ff8

    SHA1

    49c5977f540a3afc36f28222a142bbf7ed0cd5ef

    SHA256

    ebc992781e744045d5716b24f5270fba1c0d400e9e1b5c0f5c019c1478a42dc3

    SHA512

    bd6991cb29d2b03b67cea9803482b0a89b2a24042555c5acd332a9e6e148381cf33ec1a30ff4f632c0359617644dea985ff078bcc71f835b85d1b89dbf448305

  • memory/908-17-0x0000000000760000-0x0000000000766000-memory.dmp

    Filesize

    24KB

  • memory/908-23-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/1520-0-0x0000000002190000-0x0000000002196000-memory.dmp

    Filesize

    24KB

  • memory/1520-1-0x0000000002190000-0x0000000002196000-memory.dmp

    Filesize

    24KB

  • memory/1520-2-0x00000000021B0000-0x00000000021B6000-memory.dmp

    Filesize

    24KB