Analysis

  • max time kernel
    6s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-01-2024 15:13

General

  • Target

    2024-01-03_24b1ebdc4f235209426d00e2d41f60e5_cryptolocker.exe

  • Size

    45KB

  • MD5

    24b1ebdc4f235209426d00e2d41f60e5

  • SHA1

    d96545f7ff31674af2e8b86c4e494324dcdcd3c7

  • SHA256

    c4db06bcb666732932aaed3b8c3224fa527b18c9fd3a88c03c4af2efc4a546a3

  • SHA512

    2e2b1bed3f885c131db219c713220a9e40feeb5504cfd23970487dd7d37832c4e4b7431f0d1ac59bab3aa5bb87614618d56086abaedaaaae4c46e261c9c17048

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Yl6deMx:bgGYcA/53GAA6y37Q6dB

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-03_24b1ebdc4f235209426d00e2d41f60e5_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-03_24b1ebdc4f235209426d00e2d41f60e5_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3780
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    45KB

    MD5

    744a1fdf68a37e83e62bcd6f8eeb3708

    SHA1

    2f076388530894e045a6f650faae840ab8d92dd1

    SHA256

    f8de4b304312a5b78e1d89efe48e4b93b16442b69231009d1f890338d2002a28

    SHA512

    92b3e93bd2450a557b2492af09f955ba8681abe7793beb6152fddd71daaba79e185a4a25c5753b6c88de7e05211ff8c2a977fd58b679f7afe03de161c40eb3bb

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    6KB

    MD5

    662c19bf0cae4d7bfb2e5287c0359f3d

    SHA1

    5e57535bc0d79d2602e531f2e11e7b2e6eb27036

    SHA256

    3e8157d76b93b2418706c6f2041008f139cbd1de1e49e76019b19525e03ecca9

    SHA512

    7c6338ee0ee970e9f79cfdd4b4752b80b73cfb42b21824e99cde86feccf475bf63b4f3594ffb0f9adb874a1afc0cc79f5224ea47a720c38c1ff2843284a85d4f

  • memory/2904-23-0x00000000026A0000-0x00000000026A6000-memory.dmp

    Filesize

    24KB

  • memory/2904-17-0x00000000026D0000-0x00000000026D6000-memory.dmp

    Filesize

    24KB

  • memory/3780-0-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/3780-1-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/3780-2-0x0000000002400000-0x0000000002406000-memory.dmp

    Filesize

    24KB