Analysis

  • max time kernel
    150s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/01/2024, 21:22

General

  • Target

    2024-01-28_02eab072ed063619c99325392e9dae2a_cryptolocker.exe

  • Size

    38KB

  • MD5

    02eab072ed063619c99325392e9dae2a

  • SHA1

    f8d219b8abe3f127b8fc2548d21bbfe5f6a2dcb5

  • SHA256

    e2e41269722810e8b0f2f66f5987e726077c781d83f11ba3e9edfd671d118d80

  • SHA512

    980e3865bc69a6a5b175a8847ce6876e28d086e2d8ee53f603f98088ba06c7696a3526063720c8a4557c113eec32ac0a42097c84166fa225a2b1bf3f0acf8291

  • SSDEEP

    384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzl6AJvDSuYlxuQs6:b/yC4GyNM01GuQMNXw2PSjHPbSuYlM6

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-28_02eab072ed063619c99325392e9dae2a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-28_02eab072ed063619c99325392e9dae2a_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:908
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      PID:3808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\retln.exe

    Filesize

    38KB

    MD5

    a8c19021c5f7658f2ba8e39fec03cd5b

    SHA1

    c498b84287ac3ec860f05d79b1b5aee0549b4c42

    SHA256

    7efadb578ba872aed0846f1c33e3f59cb11c9e6ef56b6bda2f08dd7df6c4f3f1

    SHA512

    954ff20c6bf4766f1e34aae88428c19c1ac8da4c7dca36c39013cadae6c1b0fc26672531bf49cce53ce93e4a8bbb826725bbf6de24227410b344c8d44747b664

  • memory/908-0-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/908-1-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/908-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/3808-20-0x00000000020A0000-0x00000000020A6000-memory.dmp

    Filesize

    24KB