Analysis
-
max time kernel
88s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 01:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-29_b514d3f985afe1586f2c57f3cb1b9a82_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-29_b514d3f985afe1586f2c57f3cb1b9a82_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-29_b514d3f985afe1586f2c57f3cb1b9a82_cryptolocker.exe
-
Size
44KB
-
MD5
b514d3f985afe1586f2c57f3cb1b9a82
-
SHA1
5f2052e01a7b4651706529b787742cac22d59eda
-
SHA256
7a84cbb02471bbfc493d01ccccdc01eb61cb0a25d975da33f94ade68bcd5a782
-
SHA512
f7fb3366e667ddd3f64dfba8e1d2179786933c1d425763a48da2bcc641b506925bda47d0cebc6cb46bee6acab134795f4f0f15ba89afe075ae786f6f0541156d
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPhbCi44vCxh:6j+1NMOtEvwDpjr8dx49
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral2/memory/4284-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x0007000000023215-13.dat CryptoLocker_rule2 behavioral2/memory/4284-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral2/memory/800-54-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral2/memory/4284-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral2/files/0x0007000000023215-13.dat CryptoLocker_set1 behavioral2/memory/4284-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral2/memory/800-54-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
Detects executables built or packed with MPress PE compressor 4 IoCs
resource yara_rule behavioral2/memory/4284-0-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023215-13.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/4284-17-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/800-54-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 2024-01-29_b514d3f985afe1586f2c57f3cb1b9a82_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation misid.exe -
Executes dropped EXE 1 IoCs
pid Process 800 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4284 wrote to memory of 800 4284 2024-01-29_b514d3f985afe1586f2c57f3cb1b9a82_cryptolocker.exe 86 PID 4284 wrote to memory of 800 4284 2024-01-29_b514d3f985afe1586f2c57f3cb1b9a82_cryptolocker.exe 86 PID 4284 wrote to memory of 800 4284 2024-01-29_b514d3f985afe1586f2c57f3cb1b9a82_cryptolocker.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-29_b514d3f985afe1586f2c57f3cb1b9a82_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-29_b514d3f985afe1586f2c57f3cb1b9a82_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5e2d710f68676b746d612e385fdb368b5
SHA1c21d2438ffc5744b0fa907122e1681955e8d77dc
SHA256e204c836aa1449f3a9f19b6c42d25ee2cfcdfd02886ebdbbe6ed155df577fbf9
SHA5125b6640ffa10035284bf68c038c5a8a56f1776b0de6f1d746670e4a1735acd6460dfd000df2fcde91288cdd254a082b1321cf308b2ea6bc8191e0e56ee0e19599