Analysis

  • max time kernel
    143s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2024 06:01

General

  • Target

    2024-01-09_d3ce18af3b899e3564f3f65320478329_cryptolocker.exe

  • Size

    121KB

  • MD5

    d3ce18af3b899e3564f3f65320478329

  • SHA1

    cd1f451544d6e9070bb3a7c9daa1eecc41708d90

  • SHA256

    81a45d64ce7bea28a26a0d24822a672fe946c5d3f3d6a5b040f0ccd7bbfe9536

  • SHA512

    b8348d3b0a48776623f6b4167e7080fcbe4b1b7cc0fd329386c013b46732ecbe53631df69ca45239a75f0819ecbc217d4b48e258bd43fa9095d7da567cc5014e

  • SSDEEP

    768:gUQz7yVEhs9+4T/1bytOOtEvwDpjNbZ7uyA36S7MpxRIIXVe3mU9TYwlOBTZEN:gUj+AIMOtEvwDpjNbwQEIPlemUhYpEN

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-09_d3ce18af3b899e3564f3f65320478329_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-09_d3ce18af3b899e3564f3f65320478329_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1352
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    121KB

    MD5

    52d439e565f3851938ecdacf2cbf4ddc

    SHA1

    55f77050bd73027e1ea12da2da63b872a25e445e

    SHA256

    5ae451374331fef5da5a4ed54819d444445e15d52c3e157157133ec5995d0f28

    SHA512

    35968db40c1fd2fde0f8dea264719afbeb975dcd627a4e2cd6268b76209d16b2e4e3f2eddb4e4349c921cb1b4a875037ec1fd3091bad731d51081697ad17d608

  • memory/1352-2-0x0000000000610000-0x0000000000616000-memory.dmp

    Filesize

    24KB

  • memory/1352-1-0x00000000005F0000-0x00000000005F6000-memory.dmp

    Filesize

    24KB

  • memory/1352-0-0x00000000005F0000-0x00000000005F6000-memory.dmp

    Filesize

    24KB

  • memory/2284-18-0x0000000002080000-0x0000000002086000-memory.dmp

    Filesize

    24KB

  • memory/2284-17-0x0000000002060000-0x0000000002066000-memory.dmp

    Filesize

    24KB