Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2024, 03:09

General

  • Target

    2024-10-10_b7092c98f7f8289fe0068e87996e672c_cryptolocker.exe

  • Size

    30KB

  • MD5

    b7092c98f7f8289fe0068e87996e672c

  • SHA1

    c7079eba3c150f8a0b85a7eae522b49cf34221c0

  • SHA256

    c8a3fdce5942859b6fc60b731f5bee94d7c3f5c5b784973717e24e697fcca838

  • SHA512

    099490e7bfa1ced46e94b00876ea8741173776de39caade7a4c5455b2e71c3e4f7d498f391706eb4373150bc2ac333107f521964f199cfb58ae1bb09f6067942

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeW0aIHVc3lCR3wB:q0zizzOSxMOtEvwDpj/05V+43wB

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-10_b7092c98f7f8289fe0068e87996e672c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-10_b7092c98f7f8289fe0068e87996e672c_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4712
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    30KB

    MD5

    d2a2cb9aeb6623ee95083ae32763b59f

    SHA1

    d409ad36e2650fe9279b0d701bb1db6cc8e5ca67

    SHA256

    bd37c7bd27f7b3f2403f5d9d74ffba66823c8dafc1a31e275dd384c451edaae5

    SHA512

    cc944138ae34a4d8b0880c56180889020c28a6ac9b4d8d7cce88446943c7bba8b3f9b34930e0b700a0fa3502dd1572ca117e3a4f85aa02baa0dfa75790fe0ea3

  • memory/1364-25-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/1364-19-0x0000000000510000-0x0000000000516000-memory.dmp

    Filesize

    24KB

  • memory/1364-26-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/4712-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/4712-1-0x0000000002050000-0x0000000002056000-memory.dmp

    Filesize

    24KB

  • memory/4712-2-0x0000000002050000-0x0000000002056000-memory.dmp

    Filesize

    24KB

  • memory/4712-3-0x0000000002070000-0x0000000002076000-memory.dmp

    Filesize

    24KB

  • memory/4712-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB