Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 05:08

General

  • Target

    2024-10-12_eec3477261e4d0e9577701ce2aa15b7a_cryptolocker.exe

  • Size

    50KB

  • MD5

    eec3477261e4d0e9577701ce2aa15b7a

  • SHA1

    bddd5c708e9fe3fab2d59dedea65cd13acc09e97

  • SHA256

    ce2d798f1ab7bc67742d9cd52b6d87a916e4989ab4f55c8db9fa57bc37d5555f

  • SHA512

    9655819be871639bddc50f7703b2f166032e7670b2a10a976c1ea2dbf2423c4ca2b8dbdc53ca90f6f3e3b3cb8078caf9cbdd2e18cc25c5cf22564622bcdd618b

  • SSDEEP

    768:P6LsoVEeegiZPvEhHSP+gp/QtOOtEvwDpjBBMLZdzuqpXsiE8Wq/DpkcBJU:P6Q0ElP6G+gJQMOtEvwDpjB8WMlfM

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-12_eec3477261e4d0e9577701ce2aa15b7a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-12_eec3477261e4d0e9577701ce2aa15b7a_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3788
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2360

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          50KB

          MD5

          eb73421b588ed87fd45a80d9ba4906f1

          SHA1

          7ff7853f7d2c0a1f1b8c33e131f39454dc856e9b

          SHA256

          5a186924ab09999d974659eb216431075b4625a638d78d408d8cbd7cdc4829c1

          SHA512

          5e90369fb62f9dfbf9f2212689ea3bcfdb8b200a3ee0f9023251d755b730d698fd83dbd9e15201003585c3ae5e0a6a81b6c8fa18e686b58b1c34088daeb7cba7

        • memory/2360-17-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB

        • memory/2360-20-0x00000000006B0000-0x00000000006B6000-memory.dmp

          Filesize

          24KB

        • memory/2360-21-0x0000000001FF0000-0x0000000001FF6000-memory.dmp

          Filesize

          24KB

        • memory/2360-27-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB

        • memory/3788-0-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB

        • memory/3788-1-0x00000000004E0000-0x00000000004E6000-memory.dmp

          Filesize

          24KB

        • memory/3788-2-0x00000000004E0000-0x00000000004E6000-memory.dmp

          Filesize

          24KB

        • memory/3788-3-0x0000000002100000-0x0000000002106000-memory.dmp

          Filesize

          24KB

        • memory/3788-18-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB