Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2024 11:39
Behavioral task
behavioral1
Sample
2024-01-26_d29462da30c9f9abc36855fa3a5d85c4_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-26_d29462da30c9f9abc36855fa3a5d85c4_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-26_d29462da30c9f9abc36855fa3a5d85c4_cryptolocker.exe
-
Size
62KB
-
MD5
d29462da30c9f9abc36855fa3a5d85c4
-
SHA1
d12600e1a109a5a4833bdd60c7806feedd01c7bd
-
SHA256
d9e6e4255519a9a4e2e0d9d1639fd9d10e912e0391c6b901b23a93f002429995
-
SHA512
1b80499b6a6b7be09ea91cdec1e50893c3304419d2405bf44ec3604518de91a147053fd00f91f2ff2b84a58d77a71b191fcc0bb82f67aab537dc452f8b84052d
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5K7S:zj+soPSMOtEvwDpj4kpmeLm5
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral2/memory/3756-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x000700000002323b-13.dat CryptoLocker_rule2 behavioral2/memory/3756-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral2/memory/3708-54-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral2/memory/3756-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral2/files/0x000700000002323b-13.dat CryptoLocker_set1 behavioral2/memory/3756-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral2/memory/3708-54-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral2/memory/3756-0-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral2/files/0x000700000002323b-13.dat UPX behavioral2/memory/3756-17-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral2/memory/3708-54-0x0000000000500000-0x0000000000510000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 2024-01-26_d29462da30c9f9abc36855fa3a5d85c4_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation misid.exe -
Executes dropped EXE 1 IoCs
pid Process 3708 misid.exe -
resource yara_rule behavioral2/memory/3756-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x000700000002323b-13.dat upx behavioral2/memory/3756-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3708-54-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3756 wrote to memory of 3708 3756 2024-01-26_d29462da30c9f9abc36855fa3a5d85c4_cryptolocker.exe 87 PID 3756 wrote to memory of 3708 3756 2024-01-26_d29462da30c9f9abc36855fa3a5d85c4_cryptolocker.exe 87 PID 3756 wrote to memory of 3708 3756 2024-01-26_d29462da30c9f9abc36855fa3a5d85c4_cryptolocker.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_d29462da30c9f9abc36855fa3a5d85c4_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-26_d29462da30c9f9abc36855fa3a5d85c4_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD503e3c4a90e0a94991bbb4c22febecf7c
SHA140c38ab062b1aa10b93c9283da7a2a04be32f3ef
SHA256c8372bc22534448691fa7f78d5c886eb8795ee1601a9242a9fee4e657b41b445
SHA5121fd8bcc54746c77f1858870faec878c0f670d2e6e9f074ead88007f0dfb05659d6281d8260e7938c52cdcfb544daac6795ca9861eac80b9ab25fc2c1a0e479f9