Analysis

  • max time kernel
    150s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2024, 19:27

General

  • Target

    2024-01-26_405f6821f34bc545b8eb647c759dba10_cryptolocker.exe

  • Size

    46KB

  • MD5

    405f6821f34bc545b8eb647c759dba10

  • SHA1

    4dc0f3e50cb4e7f2a8cf13396d7d8ea1cc10215d

  • SHA256

    3a8e60d3d07c161e3dcde6c881bbf5030e03676812b2155d205b303bbd748168

  • SHA512

    cd0ff05665dcbf04deb12224382a1c7c84e99ea6d8f6f58a7dfc717145419bdca1bdfc2bdfc597f6b94eae3a2b296b7600885bb9d1f0fc360e88e33a49873ca9

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37YbDu5z/hSi:bgGYcA/53GAA6y37nbSi

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-26_405f6821f34bc545b8eb647c759dba10_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-26_405f6821f34bc545b8eb647c759dba10_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4748
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1960

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          46KB

          MD5

          04dbd739fba42860787de0b2cb4afef6

          SHA1

          9358cfc8759c1889e830f762a65c0ca5f2555a90

          SHA256

          7487575635fb5a5295313907a08839dd8e6a4c6bbc5b165428771f2bb73acfde

          SHA512

          1c5ec3e843cf7bfb6838ef4e61c82054eb960c08f65146f0e03866b18c671fb1f4da91378af021a230d5efb185eeb7b9f86be0d20d507cee44d91c238a6a0522

        • memory/1960-17-0x0000000002590000-0x0000000002596000-memory.dmp

          Filesize

          24KB

        • memory/1960-19-0x0000000002560000-0x0000000002566000-memory.dmp

          Filesize

          24KB

        • memory/4748-0-0x00000000022D0000-0x00000000022D6000-memory.dmp

          Filesize

          24KB

        • memory/4748-1-0x00000000022D0000-0x00000000022D6000-memory.dmp

          Filesize

          24KB

        • memory/4748-2-0x0000000003150000-0x0000000003156000-memory.dmp

          Filesize

          24KB