Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-09-2024 01:32

General

  • Target

    2024-09-29_dc569e8f410a37beec0d4fee64c974df_cryptolocker.exe

  • Size

    57KB

  • MD5

    dc569e8f410a37beec0d4fee64c974df

  • SHA1

    b171406f1e4028f706416ab00eaad53094b9e59b

  • SHA256

    c4bde58fa9b74dafa031c0038ea5a764d08787a852015afa5ac7aa0dae3d7f83

  • SHA512

    bdfd6db1e61676a2426edb48f7f6c47a692f7982aa63295097c977598cf68fc17f0bbef65cab853f4e2402c98784db305110271d303f3af04a706a9ee379fef9

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjyaLccCKdulcrJuA:V6a+pOtEvwDpjv9p

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-29_dc569e8f410a37beec0d4fee64c974df_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-29_dc569e8f410a37beec0d4fee64c974df_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    58KB

    MD5

    c9ef5533bcefc2440190091107afda82

    SHA1

    11aac8cd5d31ff4d2f02e0eb5aff8690131abc79

    SHA256

    b21627e09d32de4aa52a5ad9ac9efcccf70f5b95a27cc91d94b79f57387ede9a

    SHA512

    e0ea8b57fef7afcb0414c414536c4bfd3be8547e271dbf0fcbad55cee98344dd0274a7699a4606e12cbd48196d8bfa48d0b02fcbe387dcae6192fa6060e1d0cb

  • memory/1996-17-0x00000000004C0000-0x00000000004C6000-memory.dmp

    Filesize

    24KB

  • memory/1996-18-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/2368-0-0x00000000021C0000-0x00000000021C6000-memory.dmp

    Filesize

    24KB

  • memory/2368-1-0x00000000021C0000-0x00000000021C6000-memory.dmp

    Filesize

    24KB

  • memory/2368-2-0x0000000002040000-0x0000000002046000-memory.dmp

    Filesize

    24KB