Analysis

  • max time kernel
    2s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/01/2024, 05:38

General

  • Target

    2024-01-01_196d62f3ad961b348d8ec9706d1f5f89_cryptolocker.exe

  • Size

    42KB

  • MD5

    196d62f3ad961b348d8ec9706d1f5f89

  • SHA1

    4da3a7c13d1f41125204a11e3e5a1075ddd4f836

  • SHA256

    8a167b172a5c142e42bbb53364ab1384589f7ce3c88de1caa7f4b9f37e72add2

  • SHA512

    0232948e30c7ba2ea44dfed02ae0680ef50cd4b9ec94ac8e2f9f23b6c80fa233b74ec657602ef2825af25647a467d7f38cf274ab1b33701d11b4ebe07661d780

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37YbDu5zx:bgGYcA/53GAA6y37nL

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-01_196d62f3ad961b348d8ec9706d1f5f89_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-01_196d62f3ad961b348d8ec9706d1f5f89_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4364
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
        PID:4844

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

            Filesize

            16KB

            MD5

            415b0d28e972786a2a3fa9b59d0c35f4

            SHA1

            d4751a9b1cb2e4f2855b8722bf6182a1403446c2

            SHA256

            32fa2cf745312ad402a8c3f8fb8c5a013684f43df3624071b6db3be558327df1

            SHA512

            055672d58dba952ba7584e9d5efbc9d957a604a837bf89955a0ae1defc722bacd1d8b9aa8f190ec05fd0994414e57c170f975ffa58e4a61e36c748791f3db908

          • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

            Filesize

            42KB

            MD5

            6cfb9387ccf3a2066da5c0d958e7b3de

            SHA1

            1b4c9efedc4ef2b17a441c6290b88397f0ff9421

            SHA256

            3360427e3129fdc312456e0b5959d59fdebfbe3eb952e88adebb2a5922419217

            SHA512

            29c40c2d1ddae84868e838244870f283d30895f13103be32003672a9b296ea677cb7efcb12a03222b8704ee61f2469743a4ff60db25b9e2e7c653948a7b51e6c

          • memory/4364-0-0x00000000021E0000-0x00000000021E6000-memory.dmp

            Filesize

            24KB

          • memory/4364-2-0x0000000003150000-0x0000000003156000-memory.dmp

            Filesize

            24KB

          • memory/4364-1-0x00000000021E0000-0x00000000021E6000-memory.dmp

            Filesize

            24KB

          • memory/4844-17-0x0000000002ED0000-0x0000000002ED6000-memory.dmp

            Filesize

            24KB

          • memory/4844-23-0x0000000000700000-0x0000000000706000-memory.dmp

            Filesize

            24KB