Analysis

  • max time kernel
    99s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-02-2024 08:23

General

  • Target

    2024-02-04_2618359e59365da681adce117f44ba98_cryptolocker.exe

  • Size

    38KB

  • MD5

    2618359e59365da681adce117f44ba98

  • SHA1

    4165fb73a50addbbdf8627752c89d4d996dd0ba2

  • SHA256

    95a408a3a778f1741ce032d1bd72b3d575b9e6fe52d23155ebfdd4db38066980

  • SHA512

    dca117cf7d9d0259b67443c4bdb6c8943645fe304ab9c5cde1879dee9b4ff77e8e9229b42b6cde3e4941be246cbdd62823f0e279e65f1b8210a7c564b8d1e79f

  • SSDEEP

    384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzl6AJvDSuYlxu3y:b/yC4GyNM01GuQMNXw2PSjHPbSuYl7

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-04_2618359e59365da681adce117f44ba98_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-04_2618359e59365da681adce117f44ba98_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      PID:4184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\retln.exe

    Filesize

    38KB

    MD5

    a965fe397f038b0792b72924d6397921

    SHA1

    8330be40c92b4f9b452de2e40f6af3cd2ed11c84

    SHA256

    4f582c6293d82a6b92357f20510df2c8810f57266365b11b1bcfa370b2298b67

    SHA512

    ee9b5d13809215eeade4236c7f664cb05a4149cfea13d980dfd22da2617ae8b675523a4c53c5dcdf83def4c51a376b00320f5dc7f88be6e6b48788a7853c85b1

  • memory/3076-0-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/3076-1-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/3076-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/4184-21-0x0000000002110000-0x0000000002116000-memory.dmp

    Filesize

    24KB