Analysis
-
max time kernel
121s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2024 20:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-01_52c751627e9d546142b28e0c03de90d4_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-01_52c751627e9d546142b28e0c03de90d4_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-01_52c751627e9d546142b28e0c03de90d4_cryptolocker.exe
-
Size
35KB
-
MD5
52c751627e9d546142b28e0c03de90d4
-
SHA1
e842823e3836c954c71f961d7b74ed9decbc57be
-
SHA256
6d618dc5a676318557d458e0fb4bd160a776eae392983a1c83cb2db2127ebe71
-
SHA512
861080b336f971ab925f327ef08ee7e71754e04aa075a80c3491f92d6ac8cf5a2b9f3fba6c70563f5c3cc4f97c6b41c221ff3b4dd302ef20226fda1f1d0165c9
-
SSDEEP
384:+cX+ni9VCr5nQI021q4VQBqURYpetOOtEvwDpjqIGRxzOP51FqQLicn3f3QJq:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnv0q
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral2/memory/1288-0-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x00070000000231eb-13.dat CryptoLocker_rule2 behavioral2/memory/4992-18-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral2/memory/1288-17-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral2/memory/4992-55-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 3 IoCs
resource yara_rule behavioral2/memory/4992-18-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral2/memory/1288-17-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral2/memory/4992-55-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 -
Detects executables built or packed with MPress PE compressor 5 IoCs
resource yara_rule behavioral2/memory/1288-0-0x0000000000500000-0x000000000050E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x00070000000231eb-13.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/4992-18-0x0000000000500000-0x000000000050E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/1288-17-0x0000000000500000-0x000000000050E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4992-55-0x0000000000500000-0x000000000050E000-memory.dmp INDICATOR_EXE_Packed_MPress -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 2024-02-01_52c751627e9d546142b28e0c03de90d4_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation misid.exe -
Executes dropped EXE 1 IoCs
pid Process 4992 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1288 wrote to memory of 4992 1288 2024-02-01_52c751627e9d546142b28e0c03de90d4_cryptolocker.exe 84 PID 1288 wrote to memory of 4992 1288 2024-02-01_52c751627e9d546142b28e0c03de90d4_cryptolocker.exe 84 PID 1288 wrote to memory of 4992 1288 2024-02-01_52c751627e9d546142b28e0c03de90d4_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-01_52c751627e9d546142b28e0c03de90d4_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-01_52c751627e9d546142b28e0c03de90d4_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:4992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD50e7f6c8d03ca7892640aac11413b510c
SHA1f5125f356f65e9bd7a753c8b84a05348f34fbdde
SHA25646d556a8a4d58db7f2d37348ced713e5f038d3cc92f460ece3935e71a36189b6
SHA5123773f4d3bcd744103671984f7481520629050786e4ab7c54572e487b2737455b9ae49a3ee25f05baac170cfdc2f170bac5b0a6123520c3da2fb20adb50f334e7