Analysis

  • max time kernel
    48s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2024 02:27

General

  • Target

    2024-02-02_34e8c1af6f3988fd0aa0aec50af54636_cryptolocker.exe

  • Size

    46KB

  • MD5

    34e8c1af6f3988fd0aa0aec50af54636

  • SHA1

    1acfeaa88bd13c1091eda86c08a8305245594e7b

  • SHA256

    c543b0f7362dbcbf7860e0b7cf66a5c8294db9ef11466d30eee343fc1e2414a2

  • SHA512

    fdfed4f5bcd2cb51315b22ff658a3d7670745b948c665371988e565ca73487d003b1e26ac192aa83309ec17203e6195511f83bfe0f464d118c3fa03d02201a2d

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Yl6dd3H:bgGYcA/53GAA6y37Q6dd3H

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-02_34e8c1af6f3988fd0aa0aec50af54636_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-02_34e8c1af6f3988fd0aa0aec50af54636_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    47KB

    MD5

    edf815bf6c17647d748009eddadf5ff2

    SHA1

    38dc63b2f4dc8f5f303b577cab74985dacef2192

    SHA256

    ed6cbb54e565052c59eb7a140d8827b67e2b9278aef32f68cc819db473c4dbbf

    SHA512

    51aecd3f4b46dbbcbb341e0e6ee517762175ced7734fa5cf3875a7769e495e53a5bc3f94663d12e195f5a9a79038851a9a9504c7de67e229aae6a541ac69b87f

  • memory/2924-19-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/2924-17-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/4696-0-0x00000000022D0000-0x00000000022D6000-memory.dmp

    Filesize

    24KB

  • memory/4696-1-0x00000000022D0000-0x00000000022D6000-memory.dmp

    Filesize

    24KB

  • memory/4696-2-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB