Analysis
-
max time kernel
169s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 06:07
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_ec624a77a501423d733906a39800a50e_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-11_ec624a77a501423d733906a39800a50e_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-11_ec624a77a501423d733906a39800a50e_cryptolocker.exe
-
Size
37KB
-
MD5
ec624a77a501423d733906a39800a50e
-
SHA1
20b199a9635f4cb4fcf65fef5f3368a51c317120
-
SHA256
ec2b2cfd2b85ae12ddbf0f0257fee0dea36fefd1809273b2c671e6530c1a36c7
-
SHA512
8314b38bac47de6181c2e20d3a42d6fb277ee63517f3bf3299ea9bf61dab85250f831561a34b9ad83f31623c507f4bdbc8b4a95064b7ac3a490e3e0e728c4212
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzl6AJvDSuYlc5:b/yC4GyNM01GuQMNXw2PSjHPbSuYlc5
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 2024-01-11_ec624a77a501423d733906a39800a50e_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4624 retln.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3152 wrote to memory of 4624 3152 2024-01-11_ec624a77a501423d733906a39800a50e_cryptolocker.exe 91 PID 3152 wrote to memory of 4624 3152 2024-01-11_ec624a77a501423d733906a39800a50e_cryptolocker.exe 91 PID 3152 wrote to memory of 4624 3152 2024-01-11_ec624a77a501423d733906a39800a50e_cryptolocker.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_ec624a77a501423d733906a39800a50e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_ec624a77a501423d733906a39800a50e_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
PID:4624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD52369cb947b3614aa5a843e22a6a2acaf
SHA1e704d8fde03a6a6d090d56fb0c83f39f09ade7bc
SHA25607cfd6e46151ccc894f9ce08ea27f816e977f68aa58f309ea1807074882a1a2b
SHA512607f61c137f907f1401d6b10c990df177f1441b5204bcf23f137efaaa25cb54f398f2432b7d92784c03d87ea949df0c8adb83307280c3955c19949e1e9d59d70