Analysis

  • max time kernel
    147s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2024, 20:02

General

  • Target

    2024-02-01_921a8a646b53f800e3b3605b47da406d_cryptolocker.exe

  • Size

    28KB

  • MD5

    921a8a646b53f800e3b3605b47da406d

  • SHA1

    4f7b0704ad43f15ded7f44dcdc9a1778c2b9211e

  • SHA256

    53105ad33ab8bd78c9558ce863872a8cd9122d13731739d3fcf9192e0fbe8a4f

  • SHA512

    3feb7e2ce097d3b302233a99dba37f203a65f427870eda20d52130846fd9c8d084d94712ba2f711d198d3d0645597f0ba8ed59f2230b2b49367b9958bc38f18f

  • SSDEEP

    384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUr766SJ/T+AH5O:bA74zYcgT/Ekd0ryfjQRSl+

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-01_921a8a646b53f800e3b3605b47da406d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-01_921a8a646b53f800e3b3605b47da406d_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:436
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1188

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          29KB

          MD5

          9671906abb528afad857b57176fcee06

          SHA1

          edd49c9fd54c3c02f1b63d0a5af2d2dd8d9494c2

          SHA256

          fa9ebc87485760b15051661d6a4d50f88d92fc0e999015851ad71cbd19bba4a1

          SHA512

          03828513f86a1a411b8a9d42dbd58e3024b5172ec86d11b87eed17874ff37818cc91553f0423b68f1f37e83153c7afbee0877fda8bbeb45a4b77555edf2eaaf6

        • memory/436-0-0x0000000002350000-0x0000000002356000-memory.dmp

          Filesize

          24KB

        • memory/436-1-0x0000000002350000-0x0000000002356000-memory.dmp

          Filesize

          24KB

        • memory/436-2-0x0000000002400000-0x0000000002406000-memory.dmp

          Filesize

          24KB

        • memory/1188-17-0x0000000003010000-0x0000000003016000-memory.dmp

          Filesize

          24KB

        • memory/1188-23-0x0000000000700000-0x0000000000706000-memory.dmp

          Filesize

          24KB