Analysis

  • max time kernel
    147s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-02-2024 01:24

General

  • Target

    2024-02-03_3d1742fa63a47fdcd9fe643261606a45_cryptolocker.exe

  • Size

    42KB

  • MD5

    3d1742fa63a47fdcd9fe643261606a45

  • SHA1

    9344c0913f4cf00674a0e0301b78df7113050ea1

  • SHA256

    9382d470e51b167b97920361cae7757ca0846b315aad97a04edc531342721d4e

  • SHA512

    a4e2ea9f8e7208732144b1fc095c7d119e703576138c7fe34d466509af4da01d990d3f4ee03d98d4f5119017ca19a87fd43fe32de754cd0310fc796813cd9a12

  • SSDEEP

    768:bxNQIE0eBhkL2Fo1CCwgfjOg1tsJ6zeen754XcwxbFp1Yvb9w:bxNrC7kYo1Fxf3s05rwxbF7Yvbe

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-03_3d1742fa63a47fdcd9fe643261606a45_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-03_3d1742fa63a47fdcd9fe643261606a45_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Users\Admin\AppData\Local\Temp\pissa.exe
      "C:\Users\Admin\AppData\Local\Temp\pissa.exe"
      2⤵
      • Executes dropped EXE
      PID:3132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\pissa.exe

    Filesize

    42KB

    MD5

    735c239936e9de8681c97124f23caf61

    SHA1

    b54053a9fd3001a1f0c9ac34060a28bf7d1ae656

    SHA256

    61ec603e2719e6fb5951d51a73e93527f49e5132719dd792df8067fda4777abe

    SHA512

    00251aa9f163aef794c4b6b8d4bba2a0934bc8571b4021ebc9971b952abf5453d5a3cb422f7f6245905b6b0b9352340d28cb77094659c891d8a222636e695d73

  • memory/2532-0-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/2532-1-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/2532-2-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB

  • memory/3132-17-0x00000000021F0000-0x00000000021F6000-memory.dmp

    Filesize

    24KB

  • memory/3132-20-0x00000000005F0000-0x00000000005F6000-memory.dmp

    Filesize

    24KB