Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-01-2024 09:45

General

  • Target

    2024-01-23_88bce15fa9c1b4c365a7b6f2bf212339_cryptolocker.exe

  • Size

    38KB

  • MD5

    88bce15fa9c1b4c365a7b6f2bf212339

  • SHA1

    f132e67c4c41972e7b65a8074fa8adc6d143dd8c

  • SHA256

    b267a192c17927c80a978078266ec9a750aba96dc90da00aaa6e1a2739493d41

  • SHA512

    afb50ca69399242abf1e8a3bd56c731bf39e7d25ddf6444faa432b36fc30e14e6afa5c40c9880a66a2f0e357d63b8b4584eeec76535d3cbe172a3cd5b73cda99

  • SSDEEP

    384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf0w3sp8u5cZ95d9hT1z:bgX4zYcgTEu6QOaryfjqDDw3sCu529h9

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-23_88bce15fa9c1b4c365a7b6f2bf212339_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-23_88bce15fa9c1b4c365a7b6f2bf212339_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4688
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    38KB

    MD5

    1214c39b6ed8d147f0d2fba9a35e86b9

    SHA1

    1e63a3e6fa075a12e8efdfcd08b65c8c1231c257

    SHA256

    f9cf3b9e3fd38d5a2890170ad57594ff4b7249975911f7c9ad37dc529678a365

    SHA512

    3460856ee3a0b836bcc8535e47a242e6c904bf3d53569df76e13ea3059d52d18a1cdc8adc718d443184691103fe94dd0955728abaa3f8adfe060208b4a44891a

  • memory/2948-17-0x00000000026D0000-0x00000000026D6000-memory.dmp

    Filesize

    24KB

  • memory/2948-22-0x00000000026A0000-0x00000000026A6000-memory.dmp

    Filesize

    24KB

  • memory/4688-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/4688-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/4688-2-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB