Analysis

  • max time kernel
    143s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2024 02:26

General

  • Target

    2024-07-27_a7c2ac249e3f6ea0f2c4b4d578d4ceb6_cryptolocker.exe

  • Size

    79KB

  • MD5

    a7c2ac249e3f6ea0f2c4b4d578d4ceb6

  • SHA1

    d8794fa04e22b043a4402907019418e2b8f3e0a4

  • SHA256

    2dbca698e596b7dc30920b85c93d996644fa66beec623ea010091950845d692a

  • SHA512

    d599fa3e9af7bde6d0bf504189d5d4964ebeec96c7044dfb215b5207228917794329c936bb75772485ace1c6cd5de3a9550a4c4e6413a67ad926bd50e158c975

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1rHsoLktNG:X6a+SOtEvwDpjBZYvQd21

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-27_a7c2ac249e3f6ea0f2c4b4d578d4ceb6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-27_a7c2ac249e3f6ea0f2c4b4d578d4ceb6_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3876
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    79KB

    MD5

    bc2a7a5158a15c5eed5ae59b08f33e8c

    SHA1

    01d2ab177ec512645858c7cf0e6207079e49f420

    SHA256

    990587d2f68d569332f886b806748fd8c9dc779a3c07c129bd450b2df885ebe3

    SHA512

    e5969a76d6565c9121a1656b6b0f62620ea6129ba43f1858c7890225f45d2cf4724e5583b0aa53a71310683cf47eebd808c1f571df5368eb6ea0f92f1e7cf2e6

  • memory/3876-0-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB

  • memory/3876-1-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB

  • memory/3876-3-0x0000000000600000-0x0000000000606000-memory.dmp

    Filesize

    24KB

  • memory/3980-17-0x0000000000750000-0x0000000000756000-memory.dmp

    Filesize

    24KB

  • memory/3980-23-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB