Analysis

  • max time kernel
    0s
  • max time network
    75s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-01-2024 15:14

General

  • Target

    2024-01-03_512c44841812dc94ac40fe3820013db2_cryptolocker.exe

  • Size

    61KB

  • MD5

    512c44841812dc94ac40fe3820013db2

  • SHA1

    52457eb66e8da469ace9d22a6dff1dbe74528c04

  • SHA256

    915c7f4c250059f9bee86ffe310d143aab2563863550f849d41044214f1ed008

  • SHA512

    58eff33b3fecc7fd5f8c7dffd9f96834990f6785dc5a4335175126ae714d0b61ac5b3d3bb829e3a67ab207bbb4dfe3e7b33480dd0a96a120583a3e22cf487b7e

  • SSDEEP

    768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjIm8z2iaSIO/RvDQeduJHqqnz10Lhb:ZzFbxmLPWQMOtEvwDpj386Sj/RsB0Cw

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-03_512c44841812dc94ac40fe3820013db2_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-03_512c44841812dc94ac40fe3820013db2_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    PID:1716
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
        PID:2076

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\misid.exe

      Filesize

      9KB

      MD5

      ede3b07029a4436ce5e6cc7243479c47

      SHA1

      0a02404af58c1dfd48b302370c1f948c4b057961

      SHA256

      9a99a193fc5a30c4c8d0ca6f77c702553d70620cd5eb0e3d17bed6c0b1e86c43

      SHA512

      647a234ae1e65ca35eec572da14c479286b89380375874b8e5f3e92a95c32f1ebf80c85e0c4845880b68cffb7d83ea80bc43f2dd0ae33aadb2a3caf3f2f4bdb7

    • C:\Users\Admin\AppData\Local\Temp\misid.exe

      Filesize

      25KB

      MD5

      a2fcbbbc5c8930680f0853a2ce81c61d

      SHA1

      7d993150a9435caeec7377efcfdd226650d2b283

      SHA256

      9c81d2f7d2755c808de9687c2f4175727e8ae4c78fd24fb4d742aab1f85173bc

      SHA512

      45bd94527374d43d5bf3a33cd8eea6b4facb2399cfa2f44883342ae33f6a0f43cfdb61cc0fb34debb3863b56e94b17fa0452e41277d9ee958b2bb7dd75197fb0

    • C:\Users\Admin\AppData\Local\Temp\misid.exe

      Filesize

      1KB

      MD5

      3bbdc12399a3467d27698f9e48bca236

      SHA1

      15b91c592b155ddd6c5be9f52596521a1d93e200

      SHA256

      19a1e5e6271ba9807e97a77449827e72d73d9d3cfaa89ad520f5597222c616bb

      SHA512

      66d42edd5b9a9dc80b750090d0da1c7e64b11be09beb1159affe2604293dbfba3ca2f7f374ced88692aa8f6351fb3d35cf67d63a6ef100872bf0e784761748d8

    • C:\Users\Admin\AppData\Local\Temp\misids.exe

      Filesize

      315B

      MD5

      a34ac19f4afae63adc5d2f7bc970c07f

      SHA1

      a82190fc530c265aa40a045c21770d967f4767b8

      SHA256

      d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

      SHA512

      42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765

    • memory/1716-1-0x0000000000660000-0x0000000000666000-memory.dmp

      Filesize

      24KB

    • memory/1716-3-0x00000000021B0000-0x00000000021B6000-memory.dmp

      Filesize

      24KB

    • memory/1716-2-0x0000000000660000-0x0000000000666000-memory.dmp

      Filesize

      24KB

    • memory/1716-0-0x00000000004E0000-0x00000000004E3000-memory.dmp

      Filesize

      12KB

    • memory/1716-16-0x00000000004E0000-0x00000000004E3000-memory.dmp

      Filesize

      12KB

    • memory/2076-19-0x0000000000760000-0x0000000000766000-memory.dmp

      Filesize

      24KB