Analysis
-
max time kernel
87s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2024 21:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-01_3a9cbf10d38e01f108bc57af9cecd32a_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-01_3a9cbf10d38e01f108bc57af9cecd32a_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-01_3a9cbf10d38e01f108bc57af9cecd32a_cryptolocker.exe
-
Size
80KB
-
MD5
3a9cbf10d38e01f108bc57af9cecd32a
-
SHA1
109fff8f2850de9998e8a417bdb9816ae115cc33
-
SHA256
a0f44f7255c1c96ee4f5ce855f3825b639340815e8debd64603121354ccd41b6
-
SHA512
1023768150d4b3526da0226cff7ba522ee285d305cedc870a7dbb1d098a7391a31d58ad4cb58da5240f11c452b1971d08bd9c917fa31823ce9cd9c019209e68e
-
SSDEEP
1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMM9:TCjsIOtEvwDpj5HE/OUHnSMj
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral2/memory/976-0-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x0010000000023153-13.dat CryptoLocker_rule2 behavioral2/memory/976-17-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral2/memory/800-18-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral2/memory/800-55-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral2/memory/976-0-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral2/files/0x0010000000023153-13.dat CryptoLocker_set1 behavioral2/memory/976-17-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral2/memory/800-18-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral2/memory/800-55-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 2024-02-01_3a9cbf10d38e01f108bc57af9cecd32a_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation misid.exe -
Executes dropped EXE 1 IoCs
pid Process 800 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 976 wrote to memory of 800 976 2024-02-01_3a9cbf10d38e01f108bc57af9cecd32a_cryptolocker.exe 85 PID 976 wrote to memory of 800 976 2024-02-01_3a9cbf10d38e01f108bc57af9cecd32a_cryptolocker.exe 85 PID 976 wrote to memory of 800 976 2024-02-01_3a9cbf10d38e01f108bc57af9cecd32a_cryptolocker.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-01_3a9cbf10d38e01f108bc57af9cecd32a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-01_3a9cbf10d38e01f108bc57af9cecd32a_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD53780e3b2810a0513e9b77a965cbacd28
SHA1eae9d4dbaebf29d18e297258059435c4cba931c5
SHA2566500452c5bec4362396181269b9c1e49528ba74a7c135b98c5945f05c906d6c2
SHA5124ac77601ee39d43f8a14a8bcc7d32832eb8c9d7468c07d033901dcb48f3a3ae2d41f1cb01f5aff260e1515a9e4c0712f0378fc3fe28130251d1c26db3f19dce8