Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/10/2024, 12:27

General

  • Target

    2024-10-06_b3668e81488c360b7d6c1663b8e19f44_cryptolocker.exe

  • Size

    96KB

  • MD5

    b3668e81488c360b7d6c1663b8e19f44

  • SHA1

    7060b62f73d2dacdcd6526ae2de2f17aa87955d6

  • SHA256

    29a713e72aa776856e721ba446208023c1f4f645b772633bdd0bd6d929a24653

  • SHA512

    a49469b678665ede25840ddfa6e2f0eda3d56d6b9cd8736c8b560b1cc553422657c80800b0740b0854d94504053db607f35c988f0849a18a0606a7a56d899839

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNuj2GQi8YU:V6a+pOtEvwDpjtz1

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-06_b3668e81488c360b7d6c1663b8e19f44_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-06_b3668e81488c360b7d6c1663b8e19f44_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4224
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3508
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3840,i,8231329449558834090,4540802069600791165,262144 --variations-seed-version --mojo-platform-channel-handle=4128 /prefetch:8
    1⤵
      PID:4352

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\asih.exe

            Filesize

            96KB

            MD5

            da88495fdadb7c3ad0ffdf179dfc90e8

            SHA1

            0da4fb23b39a23d699f5fd2e3ff6a1026cf4810f

            SHA256

            e865661104664115f6dac9b5da7cecc87dab5936206c64a7c7a4622a45018876

            SHA512

            197c959372cee898d79ce5a74b49da8fdc8f63ee772a000f55f6c542d16345fde563abde6927463392e645f543f2b4d82437d79e096139b8ab26d6076dcde0eb

          • memory/3508-17-0x00000000004D0000-0x00000000004D6000-memory.dmp

            Filesize

            24KB

          • memory/3508-18-0x00000000004F0000-0x00000000004F6000-memory.dmp

            Filesize

            24KB

          • memory/4224-0-0x0000000002310000-0x0000000002316000-memory.dmp

            Filesize

            24KB

          • memory/4224-1-0x0000000002310000-0x0000000002316000-memory.dmp

            Filesize

            24KB

          • memory/4224-2-0x00000000021A0000-0x00000000021A6000-memory.dmp

            Filesize

            24KB