Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/10/2024, 05:26

General

  • Target

    2024-10-06_5cd1710471c1c78264f49b1b92686b1c_cryptolocker.exe

  • Size

    76KB

  • MD5

    5cd1710471c1c78264f49b1b92686b1c

  • SHA1

    6cbd0c73bab04ea16af1a74dcf642eb2daf102ad

  • SHA256

    61acafc93bf80e4430eb53dc84b59e598950f4a471ecabc543be2d2b0c8cbecb

  • SHA512

    df9f8b6e6a4c53502819cd57eec3b6dc2194dc38fe6ced84d779c36134fdd0d487dad8498aa2c8c0e1bfb8d1958f3e94b34f876dd542ba9cbca1e77e5d2577cb

  • SSDEEP

    768:u6LsoEEeegiZPvEhHSG+gZgtOOtEvwDpjeY10Y/YMsMXj:u6QFElP6n+gWMOtEvwDpjJGYQb+j

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-06_5cd1710471c1c78264f49b1b92686b1c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-06_5cd1710471c1c78264f49b1b92686b1c_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3464
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    76KB

    MD5

    d5e2c9fa826f5ab699ff4641a3a158b8

    SHA1

    84b0ca4871b44fafad60729c90a36e3c6068c4e2

    SHA256

    862c545ac875527b7e7924420aa01c123aa0721d5c2a414b7aa307a119ec5fa1

    SHA512

    32cb5199e972cade1bb6ce355857568cda772a1ec9ce37277c8fec01f181c3506f4f780d9c1a0b1c3717f5f5732e4de9bdf2e82b4e7420160458ae86207750be

  • memory/3464-0-0x00000000007B0000-0x00000000007B6000-memory.dmp

    Filesize

    24KB

  • memory/3464-1-0x00000000007B0000-0x00000000007B6000-memory.dmp

    Filesize

    24KB

  • memory/3464-2-0x00000000020F0000-0x00000000020F6000-memory.dmp

    Filesize

    24KB

  • memory/4796-17-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/4796-18-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB