Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/08/2024, 07:25

General

  • Target

    2024-08-06_e1782500288711560b2ce18adbd61323_cryptolocker.exe

  • Size

    48KB

  • MD5

    e1782500288711560b2ce18adbd61323

  • SHA1

    5a010afa0a9e945cbd440422fe9a517045e7a57c

  • SHA256

    fa78beed604ac4d706ceef6aa4134af0ed9274c617c0895e0957a260480cd438

  • SHA512

    fd2dde5e132f98ca1f02123bc9eadd54581df501ba9f208ddafcc34fb4ba0abe6b2a400eadb5bb96ff91a909d399e3a4f0121293a796d099ab2873de6f0b313d

  • SSDEEP

    768:P6LsoVEeegiZPvEhHSP+gp/QtOOtEvwDpjBBMLZdzuqpXsiE8Wq/Dpkc/:P6Q0ElP6G+gJQMOtEvwDpjB8WMlf/

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-06_e1782500288711560b2ce18adbd61323_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-06_e1782500288711560b2ce18adbd61323_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3368
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    49KB

    MD5

    5fd981c155e25f3f393cbcf3ba81e0d1

    SHA1

    74c2d3ac336c5263b8222a8ceaf3122552155870

    SHA256

    2138b7905b44fc79996fd62c34faa12e56c11f65e23e04285ca8a2bce31626df

    SHA512

    e475cc99b05aee082b756b3eda41247160cb527e26b0df28e1e87ef2f7f537af59c73acf23e280d4fb14d10996bdd43b9a90ce9c4f4f96538d53c41502cc1b9f

  • memory/3368-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/3368-1-0x0000000000670000-0x0000000000676000-memory.dmp

    Filesize

    24KB

  • memory/3368-2-0x0000000000670000-0x0000000000676000-memory.dmp

    Filesize

    24KB

  • memory/3368-3-0x0000000002240000-0x0000000002246000-memory.dmp

    Filesize

    24KB

  • memory/3368-17-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/3560-19-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB

  • memory/3560-25-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/3560-26-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB