Analysis

  • max time kernel
    143s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-02-2024 09:39

General

  • Target

    2024-02-01_89835e3841a8666b7d1cd6ac7020e0b0_cryptolocker.exe

  • Size

    41KB

  • MD5

    89835e3841a8666b7d1cd6ac7020e0b0

  • SHA1

    d4f80ab90f36840812bdb317b7f4baf6eaf98108

  • SHA256

    cde47e569e642b1b91d8d1f0959e26025b9862c53a6261dd9c537d2ea17da93d

  • SHA512

    3534f4dedc4ce01dfcecfd397810ff487fdb0fd77ae21bf6ca74ae4cb2ee57c39e2d4877ecbdc9e5f251791ef62b161d94b4f74a29f59d0537df4ff60575d11b

  • SSDEEP

    384:60VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26aIIcVRYpetOOtEvwDpjqIGRmdHzOOp:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/L

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Detects executables built or packed with MPress PE compressor 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-01_89835e3841a8666b7d1cd6ac7020e0b0_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-01_89835e3841a8666b7d1cd6ac7020e0b0_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3832
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:1708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    41KB

    MD5

    165a8c551c994f551da2f915ab625f0a

    SHA1

    382da22fc1a27b89cb0fefb9b3d2540425cea321

    SHA256

    4eacd74f81471ae2679ec571eff9818bd060f405b712a41c144a2824f3f53651

    SHA512

    8702307a257f703eb216d16f63abd9ba664e98e59232bedbcc02503cfffb268f1b31907af8448520fc52f906cf40ac538cd57a1823efe5cb43ac957557752309

  • memory/1708-20-0x0000000001F60000-0x0000000001F66000-memory.dmp

    Filesize

    24KB

  • memory/1708-19-0x0000000002090000-0x0000000002096000-memory.dmp

    Filesize

    24KB

  • memory/1708-54-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/3832-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/3832-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3832-2-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3832-3-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/3832-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB