Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 05:34

General

  • Target

    2024-09-19_c833ea2de178f622af682baddfba5979_cryptolocker.exe

  • Size

    73KB

  • MD5

    c833ea2de178f622af682baddfba5979

  • SHA1

    971d44eb06f7eef9dbc9ba2a2fd2c8dbf2633a2c

  • SHA256

    5782a8c4ea58074593caf8db167ee6b77e4e51bf9dc45c9761b44d7338ff2856

  • SHA512

    db0674ede21e1e2c2228846a74a652a6b24f73b5c7face5b3dbabb59c52c68f326515c3e5271a9eb103bf63420b6a4a00a62aa6d55e3c223635b4c49b61bcc87

  • SSDEEP

    768:u6LsoEEeegiZPvEhHSG+gZgtOOtEvwDpjeY10Y/YMs0:u6QFElP6n+gWMOtEvwDpjJGYQb0

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-19_c833ea2de178f622af682baddfba5979_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-19_c833ea2de178f622af682baddfba5979_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3884
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    73KB

    MD5

    291191b440a51717f795b99b60e7bcea

    SHA1

    77be1e5f29ea0bc295bb00181b4bad51238e2a9a

    SHA256

    a0e16ca026a02f71b60035afd52e1b719421f20dbf0843f05ef7103fc1b49a30

    SHA512

    5e3ee230b221141312044ceb67755288fd550a6c267bfe3041ad871006bb58d0672d422bfff59f5afb452c08bd6381826965661a9ddbb56891a3246bad214a63

  • memory/3884-0-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/3884-1-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/3884-2-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB

  • memory/4052-18-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/4052-17-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB