Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-01-2024 19:35

General

  • Target

    2024-01-26_946868b22d373d949c69b3763218db46_cryptolocker.exe

  • Size

    59KB

  • MD5

    946868b22d373d949c69b3763218db46

  • SHA1

    af19d722bd8cb56e6774bda6104918c96757d124

  • SHA256

    60eb711c3ec8eaf9d378f6b8d49a493f812ac16e01228c2301d9d3d60e2efd47

  • SHA512

    b7939eaa021c60aa5a49b4eb5c0a8f43ed255e4a8251e046bf0c911a4542e732e2ed60dde3012f92d592c39b789a3ca36736e7e2a0bc57c3d46093c2d96dbc22

  • SSDEEP

    768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4hdCY8EQMjpi/Wpi3B3URiLnuoUwUsfqB1b:vj+jsMQMOtEvwDpj5Hy7B3gG8xzUe

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 3 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-26_946868b22d373d949c69b3763218db46_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-26_946868b22d373d949c69b3763218db46_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies system certificate store
      PID:3860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    58KB

    MD5

    c719d67850abbbb78684517c09091c7a

    SHA1

    1c3bb0319c3853673e644336cf89e69447f98a08

    SHA256

    7b431f6fb11c014d3dfd4900072c0319a44bc62e370ed3b2b6e3cd78636ba1e7

    SHA512

    008ad86b1c8d8d72d6f5e04e27ebaa28f6e71e94268b8bb472043ff470057f9070a2dea597c0fd076772795e3e41ed94400c0926fa716dd27383b4d15fb9fbae

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    60KB

    MD5

    08a7135c0d051b5de420aa1d658628bc

    SHA1

    7337982ca69645c45cff9f2666aa537f3baf08bd

    SHA256

    5b68e4940e1e2f8c4b090fc8a771f613f7e35efd650c07291986f4ba265fab37

    SHA512

    f79889ecdcca43646b2f79cb49e2125ee5f727b9f8c5f932ff364cb773820199ad0f50dcbae97fa1734491a8b9cbf95f707a79e9870a0275b1b96ae05f944782

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    35KB

    MD5

    acfd1b25dd63d054e20a48540d4c6341

    SHA1

    dd1a7485eb3b61a8d24ae84335196217168bbd7e

    SHA256

    a170daaf1e2c0e380ebe3f985c5cbf6a05f0c25bf2c86c24dd3a608b089a08c6

    SHA512

    65a47051fe9295e07cd672ad15b371d99896870a7c9d7f8cfbc8de5733471cd6c0b45a821b0d25aaefe11303fdf130ff4d3e265969d3b92b34aeebd200626f50

  • C:\Users\Admin\AppData\Local\Temp\misids.exe

    Filesize

    315B

    MD5

    a34ac19f4afae63adc5d2f7bc970c07f

    SHA1

    a82190fc530c265aa40a045c21770d967f4767b8

    SHA256

    d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

    SHA512

    42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765

  • memory/3860-18-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/3860-17-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB

  • memory/4612-1-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB

  • memory/4612-0-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB

  • memory/4612-2-0x00000000021B0000-0x00000000021B6000-memory.dmp

    Filesize

    24KB