Analysis

  • max time kernel
    140s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2024, 13:34

General

  • Target

    2024-02-03_b541961035d9f8eea2e3df348f0196f9_cryptolocker.exe

  • Size

    88KB

  • MD5

    b541961035d9f8eea2e3df348f0196f9

  • SHA1

    e8a5775993315188620574b99b8bf85b289dd7e9

  • SHA256

    344a09a623ef3a66f654051b03ad2117dcd418247eaa45197fd44281dc38d1ec

  • SHA512

    d927b4c17c6bd7a56035aa448a1585b71ac323f0c6cb00a793ee426b32c4381edc44a3d15ee9b6b946dfecf500a152fdac024e7464ac2df0e43f048d57cb31cb

  • SSDEEP

    1536:vj+jsMQMOtEvwDpj5H8u8rBN6nqEZNi1OkQNX:vCjsIOtEvwDpj5H8zPsD

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-03_b541961035d9f8eea2e3df348f0196f9_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-03_b541961035d9f8eea2e3df348f0196f9_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:452
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:1612

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          88KB

          MD5

          a32e228dd8ee5000375c8efd1d74cbcc

          SHA1

          b3e4b23f901f44cf5f5847b57f30589b77492c23

          SHA256

          099cd3f67e4071f6d4df53ecee8d27274bb3d4b277b7d132db72039589013e51

          SHA512

          e3077021a7fc63932c7ec707535cd1adada82d3ec952368ba464ba82f988008114a5603b2f7adb1a3f2685ebfdd39387ff5a9afe4202142091974520b90247ea

        • memory/452-0-0x0000000000520000-0x0000000000526000-memory.dmp

          Filesize

          24KB

        • memory/452-1-0x0000000000520000-0x0000000000526000-memory.dmp

          Filesize

          24KB

        • memory/452-2-0x00000000021C0000-0x00000000021C6000-memory.dmp

          Filesize

          24KB

        • memory/1612-19-0x00000000006A0000-0x00000000006A6000-memory.dmp

          Filesize

          24KB

        • memory/1612-17-0x00000000006C0000-0x00000000006C6000-memory.dmp

          Filesize

          24KB