Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 04:31

General

  • Target

    2024-09-19_a2f261496cffb96025370f5904c30745_cryptolocker.exe

  • Size

    45KB

  • MD5

    a2f261496cffb96025370f5904c30745

  • SHA1

    d7fa66b5d9b615e82f7148e7bc42ef88780ecb8a

  • SHA256

    0f0909f4af2d475a6f45dddf4b6a4e622b14e967504729acecab69be3ab26286

  • SHA512

    882ee76111f2f4d93364670efa3730bdbc97230bb765f4932569b422d39089a24bd4528c6faf71e40617e772a3e5b44a818c6317bb64f960c6d28fc5d4cb0927

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpjeJQ7suIlsw92KFXckdF:V6QFElP6n+gMQMOtEvwDpjeJQ7pojakX

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-19_a2f261496cffb96025370f5904c30745_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-19_a2f261496cffb96025370f5904c30745_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    45KB

    MD5

    8f105a344aa0007e2d398537f71b7051

    SHA1

    f2a12f2f5070e2fd6c0cb1f597edec44f0265e2d

    SHA256

    3e7ee51eb48511be674954028f412e9a8a40b614177d78f1d24e715413b5edef

    SHA512

    696899b136525947fc6091ad6ba153e105426ed5455bc8f394ba62e481cbb3fe234222d6c0773a76528b4619950fb1d478618c9f83ace1daa4abd6bbaab66b6a

  • memory/1624-0-0x0000000002060000-0x0000000002066000-memory.dmp

    Filesize

    24KB

  • memory/1624-1-0x0000000002060000-0x0000000002066000-memory.dmp

    Filesize

    24KB

  • memory/1624-2-0x0000000002080000-0x0000000002086000-memory.dmp

    Filesize

    24KB

  • memory/2860-17-0x0000000002070000-0x0000000002076000-memory.dmp

    Filesize

    24KB

  • memory/2860-23-0x0000000000530000-0x0000000000536000-memory.dmp

    Filesize

    24KB