Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_642cb2250d2c83eedf70d17532a29194_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_642cb2250d2c83eedf70d17532a29194_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-09_642cb2250d2c83eedf70d17532a29194_cryptolocker.exe
-
Size
33KB
-
MD5
642cb2250d2c83eedf70d17532a29194
-
SHA1
efac32a2a1bb011632161e6f94399ec62eff1d29
-
SHA256
c9193cfe9dcff83389d63bceeb62436a7b9e2910e43efb9cc6f4a74a5d7ea2af
-
SHA512
9fc6f07f1970aee66311ae94a2403eec88457533acce3fc50d65dd021ce24c6058844f8293bb26b632b287afbdd26e9621d4d94765e3cf4c48c773b01d326c6c
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznStEEr9VE/cog:b/yC4GyNM01GuQMNXw2PSjSKEBVE/c/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 2024-01-09_642cb2250d2c83eedf70d17532a29194_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3680 retln.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3872 wrote to memory of 3680 3872 2024-01-09_642cb2250d2c83eedf70d17532a29194_cryptolocker.exe 91 PID 3872 wrote to memory of 3680 3872 2024-01-09_642cb2250d2c83eedf70d17532a29194_cryptolocker.exe 91 PID 3872 wrote to memory of 3680 3872 2024-01-09_642cb2250d2c83eedf70d17532a29194_cryptolocker.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-09_642cb2250d2c83eedf70d17532a29194_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-09_642cb2250d2c83eedf70d17532a29194_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
PID:3680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5f12ea32a0df3bf812021b72e0dff24c1
SHA1607728a54f3c1683781e1554f09fe0ceb78fd5ac
SHA256abf153c94fdedd7859a0925f231946239ee0f3d40b08e7e04dfa25818895c723
SHA512836242086d6033174ec0ea5b7fba60368f9f799dfb339cf9777d78b16ddd3da1df5109c9e61c58a56aeee7b669cfdf219ec644c3d1f246b97806c8e37870c875