Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2024 08:13

General

  • Target

    2024-10-31_f17a03a3009035502e26a03827cfd1b6_cryptolocker.exe

  • Size

    28KB

  • MD5

    f17a03a3009035502e26a03827cfd1b6

  • SHA1

    b767ec4f1b7503fb0f7b25d29543c2327d645b1d

  • SHA256

    64bf0352a9de92423c6e3f24e886e86365ea3330ec118b2ffe5a8b8f0128203b

  • SHA512

    c5a54de964381f8b889869172a48a8b4abba1a5ebafb13a8e021c5160b969c88f8af5b6bca9537e0311778c02baecfe0a4389bed7cf624049a35c21647cb7ca1

  • SSDEEP

    768:jOb2gOo0mw18ae8MrQRN7DctOOtEvwDpjQ:jKUog898rYMOtEvwDpjQ

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-31_f17a03a3009035502e26a03827cfd1b6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-31_f17a03a3009035502e26a03827cfd1b6_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    28KB

    MD5

    6f1ff35968542aabc89b8de24714a8b5

    SHA1

    526af8b27dd91e1feaa30150119fb30496943b50

    SHA256

    0009a6c91e4bd1f841fd3157fc0812f0102d7f4395b025608855ba48e724080f

    SHA512

    bf8e04ea5f87444791f33385b7186d8b2b8f902508f1743f96cf559d8823c759346c594f109f726c557d297a86af37c28457fe430d8041e31b45409e64ddc6a0

  • memory/1700-0-0x0000000000500000-0x0000000000514000-memory.dmp

    Filesize

    80KB

  • memory/1700-1-0x00000000007C0000-0x00000000007C6000-memory.dmp

    Filesize

    24KB

  • memory/1700-2-0x00000000007C0000-0x00000000007C6000-memory.dmp

    Filesize

    24KB

  • memory/1700-3-0x00000000007E0000-0x00000000007E6000-memory.dmp

    Filesize

    24KB

  • memory/1700-18-0x0000000000500000-0x0000000000514000-memory.dmp

    Filesize

    80KB

  • memory/4136-20-0x00000000006D0000-0x00000000006D6000-memory.dmp

    Filesize

    24KB

  • memory/4136-26-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/4136-27-0x0000000000500000-0x0000000000514000-memory.dmp

    Filesize

    80KB