Analysis

  • max time kernel
    0s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/01/2024, 22:45

General

  • Target

    2024-01-18_4f79ef6e14940e1530890c91914a662b_cryptolocker.exe

  • Size

    44KB

  • MD5

    4f79ef6e14940e1530890c91914a662b

  • SHA1

    b721c97bb9a3b25f37738a53a29b0d5520c9ac90

  • SHA256

    5978311f68d3825a3114c6c95723d2a6c875c7c28a5e507501ad7c34e5387ba0

  • SHA512

    e584c79d305c25d5e932186a4722960d4f9bfa20a61e930a443bbe63a2ace8bb2a9a8d26b7c38603339fa385684443baf1af429d0346f9f23fbc92990a93d273

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37YlPI:bgGYcA/53GAA6y37Qg

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-18_4f79ef6e14940e1530890c91914a662b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-18_4f79ef6e14940e1530890c91914a662b_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3592
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2164

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          9KB

          MD5

          15f70a631af003759933105e90845e43

          SHA1

          c04cd6240e6da5d7c7d895ecd4d25253e6ee8cb6

          SHA256

          98ddb31c53708fc7625ada22f28a74e17a3b1ff5de2c86ba0c6e9a3a3950f6df

          SHA512

          c65c1578c3c26399f9d06a1dae121313d49ed12a8517679c0843c0b711038c7e48bcbf76ce86b7258728b9b8dea9d8b7a1dab1486bc81dddd9bfd7c0ef3f5b80

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          36KB

          MD5

          4f1e5bc5538ad3b5db1d0868cda30e16

          SHA1

          08c3a8ccee28f1e2d7f98dfe1cdda3f535ae09e0

          SHA256

          f661c6b88a5f738795e2b0960594e355a220324242e5202bf7778bef5a22da97

          SHA512

          4e0c7010b92f78860fbc574b35b2c3bbb9167a9e0f9ad7d0d5bde0a69d164af9ac1fb9bfd267dc59a63d20167c8857fd3dd7d88745d0d129ae806538d7758aa2

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          37KB

          MD5

          f59466906acb6851c15a689d8ab72d01

          SHA1

          784939c68b3a08c1d77b09b8eaa904e0ed302e5c

          SHA256

          fdc479fac5adf47ac54156c513db7a864fc696b0576b995e41b8eeda6cb87120

          SHA512

          ef6ec29fd15b06de0a3b4f2c87481e56f0909d9e4a95fd8c53ee0b502566f4c57713cda0c4c622ac4cd71462ee09569d6e29b41acde87a406bedef5a530f2031

        • memory/2164-17-0x0000000003010000-0x0000000003016000-memory.dmp

          Filesize

          24KB

        • memory/2164-23-0x0000000002190000-0x0000000002196000-memory.dmp

          Filesize

          24KB

        • memory/3592-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

          Filesize

          24KB

        • memory/3592-2-0x0000000003150000-0x0000000003156000-memory.dmp

          Filesize

          24KB

        • memory/3592-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

          Filesize

          24KB