Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2024 02:29

General

  • Target

    2024-10-03_565561359777ab107ddfeb78dbbc79e8_cryptolocker.exe

  • Size

    48KB

  • MD5

    565561359777ab107ddfeb78dbbc79e8

  • SHA1

    fb022a19f857d56db1a598177393f0a732aa9ff4

  • SHA256

    3d231474c4a82bcf1f63146efa9b6964907bf4a167ff088f44e9784f9ead0d1a

  • SHA512

    beaff36cbf832d73f67a6ee53a1583a56d99e5bba50e6a5d074abb4bbd4cede38e888779bfe5ffe5de370acf5de4772cace5a9d48dbdf5a2162ebab91c9a1aa9

  • SSDEEP

    768:79inqyNR/QtOOtEvwDpjBKccJVODvy3Z5/:79mqyNhQMOtEvwDpjBzckqX/

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-03_565561359777ab107ddfeb78dbbc79e8_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-03_565561359777ab107ddfeb78dbbc79e8_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    48KB

    MD5

    ae5db4c2ed0c53bfdd2835b5fcfb5ab3

    SHA1

    ba6ce8d9861b94f6e822b22ea7823d857cf477f0

    SHA256

    2fd8759d215b1aae678a6e6d541f51f8e0b142ed30a3b2ef99187c56f042c7b3

    SHA512

    060963e3b199a3ef16fda96c5b3e938e12fb6db8b40070c8bb5d8c7de006f5febbed99392d5327f732148c00b52063b332e59fd7f51680d0402f51c858af2c6a

  • memory/976-20-0x0000000000750000-0x0000000000756000-memory.dmp

    Filesize

    24KB

  • memory/976-19-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB

  • memory/976-26-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2120-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2120-1-0x00000000005F0000-0x00000000005F6000-memory.dmp

    Filesize

    24KB

  • memory/2120-2-0x00000000005F0000-0x00000000005F6000-memory.dmp

    Filesize

    24KB

  • memory/2120-3-0x00000000021B0000-0x00000000021B6000-memory.dmp

    Filesize

    24KB

  • memory/2120-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB