Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-09-2024 06:37

General

  • Target

    2024-09-07_61ed47d4ca79d677d18141e74f0593e8_cryptolocker.exe

  • Size

    93KB

  • MD5

    61ed47d4ca79d677d18141e74f0593e8

  • SHA1

    93ffc4db7651cbdf30cda66a70be6438eff423d0

  • SHA256

    005b3abd56d308a2628b1cd66949f85f8e9b2242af3cbdb30931f66c304e54b6

  • SHA512

    a483ccca5a21ff99ee6f5a0a7c7fa947006be49245d23dfa450c6444fd889e525883ffcd76b0538760207ee42a8aa047ab87d1278d957a3c0e550e6e07b0d8fb

  • SSDEEP

    1536:26QFElP6n+gBQMOtEvwDpjQGYQbN/PKwNCJN:26a+2OtEvwDpjtzwN

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-07_61ed47d4ca79d677d18141e74f0593e8_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-07_61ed47d4ca79d677d18141e74f0593e8_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3584
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    93KB

    MD5

    3f50d6b29b0187b2c0f9550cb3946675

    SHA1

    2b47aa74526d6d4d8faae2afa574b53373dfe4da

    SHA256

    74d63c6a2b921856a607d800b4477b8259eec82a2c8d0571f939b7d7bd548f2b

    SHA512

    1611ee13c3bb18cf91ef8dce61e7457f48c6a5fad639b97733997f7991bf3ee89de672c67ccd7e4ea6333cd2034539608ab49133d5821becf65bb1eb798cbdcf

  • memory/3584-0-0x0000000000560000-0x0000000000566000-memory.dmp

    Filesize

    24KB

  • memory/3584-1-0x0000000000560000-0x0000000000566000-memory.dmp

    Filesize

    24KB

  • memory/3584-2-0x0000000002060000-0x0000000002066000-memory.dmp

    Filesize

    24KB

  • memory/4988-17-0x0000000001F60000-0x0000000001F66000-memory.dmp

    Filesize

    24KB

  • memory/4988-23-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB