Analysis
-
max time kernel
0s -
max time network
75s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2024 15:14
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-03_512c44841812dc94ac40fe3820013db2_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-03_512c44841812dc94ac40fe3820013db2_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-03_512c44841812dc94ac40fe3820013db2_cryptolocker.exe
-
Size
61KB
-
MD5
512c44841812dc94ac40fe3820013db2
-
SHA1
52457eb66e8da469ace9d22a6dff1dbe74528c04
-
SHA256
915c7f4c250059f9bee86ffe310d143aab2563863550f849d41044214f1ed008
-
SHA512
58eff33b3fecc7fd5f8c7dffd9f96834990f6785dc5a4335175126ae714d0b61ac5b3d3bb829e3a67ab207bbb4dfe3e7b33480dd0a96a120583a3e22cf487b7e
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjIm8z2iaSIO/RvDQeduJHqqnz10Lhb:ZzFbxmLPWQMOtEvwDpj386Sj/RsB0Cw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 2024-01-03_512c44841812dc94ac40fe3820013db2_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-03_512c44841812dc94ac40fe3820013db2_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-03_512c44841812dc94ac40fe3820013db2_cryptolocker.exe"1⤵
- Checks computer location settings
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5ede3b07029a4436ce5e6cc7243479c47
SHA10a02404af58c1dfd48b302370c1f948c4b057961
SHA2569a99a193fc5a30c4c8d0ca6f77c702553d70620cd5eb0e3d17bed6c0b1e86c43
SHA512647a234ae1e65ca35eec572da14c479286b89380375874b8e5f3e92a95c32f1ebf80c85e0c4845880b68cffb7d83ea80bc43f2dd0ae33aadb2a3caf3f2f4bdb7
-
Filesize
25KB
MD5a2fcbbbc5c8930680f0853a2ce81c61d
SHA17d993150a9435caeec7377efcfdd226650d2b283
SHA2569c81d2f7d2755c808de9687c2f4175727e8ae4c78fd24fb4d742aab1f85173bc
SHA51245bd94527374d43d5bf3a33cd8eea6b4facb2399cfa2f44883342ae33f6a0f43cfdb61cc0fb34debb3863b56e94b17fa0452e41277d9ee958b2bb7dd75197fb0
-
Filesize
1KB
MD53bbdc12399a3467d27698f9e48bca236
SHA115b91c592b155ddd6c5be9f52596521a1d93e200
SHA25619a1e5e6271ba9807e97a77449827e72d73d9d3cfaa89ad520f5597222c616bb
SHA51266d42edd5b9a9dc80b750090d0da1c7e64b11be09beb1159affe2604293dbfba3ca2f7f374ced88692aa8f6351fb3d35cf67d63a6ef100872bf0e784761748d8
-
Filesize
315B
MD5a34ac19f4afae63adc5d2f7bc970c07f
SHA1a82190fc530c265aa40a045c21770d967f4767b8
SHA256d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
SHA51242e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765