Analysis

  • max time kernel
    87s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/01/2024, 01:33

General

  • Target

    2024-01-24_eb978e3d368f9e9de2bbbb72bab8d7f0_cryptolocker.exe

  • Size

    73KB

  • MD5

    eb978e3d368f9e9de2bbbb72bab8d7f0

  • SHA1

    1f70245fbdb21d1915a8f24ba02771f38f2019b2

  • SHA256

    b3f7d7e00943ab78a8260289a2e9975caf6174c7fc250d4fbdfa908c5cf5c4c9

  • SHA512

    2670363bc8448f6e6a4d05d4f5aa58e205875bb029845349be659bb3932a23dd55aeb40589562b75f145d3437049738034a38e36b328bb8fd39e762166e8c6a6

  • SSDEEP

    1536:ZzFbxmLPWQMOtEvwDpj386Sj/WprgJN6tZdOyJ3Ks:ZVxkGOtEvwDpjcab

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-24_eb978e3d368f9e9de2bbbb72bab8d7f0_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-24_eb978e3d368f9e9de2bbbb72bab8d7f0_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies system certificate store
      PID:4832

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          73KB

          MD5

          bedd104eb21899880bdfc6bb4e75a5b8

          SHA1

          69ec2559cd7ca4cde5e94f7d6dfe7ca4f2ec36d8

          SHA256

          1c83e01c8ec7e390b2cb23b87b204f496ae7f88d67336a20d431c65e5b280ec0

          SHA512

          eec293f72a17010e89d3fe73b4452ac5508ab2025269a219afb9654fea7171c499c1e8af6b775986897988cdfadced25a5d343bff566c119d51920f358f1f0ba

        • C:\Users\Admin\AppData\Local\Temp\misids.exe

          Filesize

          315B

          MD5

          a34ac19f4afae63adc5d2f7bc970c07f

          SHA1

          a82190fc530c265aa40a045c21770d967f4767b8

          SHA256

          d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

          SHA512

          42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765

        • memory/2184-0-0x00000000004E0000-0x00000000004F0000-memory.dmp

          Filesize

          64KB

        • memory/2184-2-0x0000000000570000-0x0000000000576000-memory.dmp

          Filesize

          24KB

        • memory/2184-3-0x00000000006D0000-0x00000000006D6000-memory.dmp

          Filesize

          24KB

        • memory/2184-1-0x0000000000570000-0x0000000000576000-memory.dmp

          Filesize

          24KB

        • memory/4832-17-0x00000000004E0000-0x00000000004E3000-memory.dmp

          Filesize

          12KB

        • memory/4832-19-0x0000000000860000-0x0000000000866000-memory.dmp

          Filesize

          24KB

        • memory/4832-21-0x00000000006A0000-0x00000000006A6000-memory.dmp

          Filesize

          24KB

        • memory/4832-48-0x00000000004E0000-0x00000000004E3000-memory.dmp

          Filesize

          12KB