Analysis

  • max time kernel
    134s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2024, 04:41

General

  • Target

    2024-02-12_5f278f6666ee3198720dcc58177a7b95_cryptolocker.exe

  • Size

    38KB

  • MD5

    5f278f6666ee3198720dcc58177a7b95

  • SHA1

    67354bf996e9a096fdca5c5ebe35422eaeede41b

  • SHA256

    1a1dda66386c1a3fc31c93db16f0f61f7bbfacb5d4ea7e5339f08f554cc37633

  • SHA512

    0a630cb7ccc34c21de8d175df4d51775ed63850119e4c826b1a47b9d98822456c18e2afa2c7ce7d298451aaf3713e2d94c0bb07fd398c5379bed2aa21f49f46a

  • SSDEEP

    768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLenQL8V:ZzFbxmLPWQMOtEvwDpjLeUq

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-12_5f278f6666ee3198720dcc58177a7b95_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-12_5f278f6666ee3198720dcc58177a7b95_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:5072

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          38KB

          MD5

          e37e214e604e436c2ae6fa2e02adf093

          SHA1

          b2d3ff7cc24a64346c89e1615076da23cb47b8ce

          SHA256

          5c747e59d0b3992e3f1b31247ee745a3367e2bdaa07220be906429c2db7d2ec5

          SHA512

          e5009653a6013572fd77a22901d64e303749cee408122f1ecebc048ab3426223ab3f1bef78a402478ef8328881cb775cf9c9ec0d1851a8da10a48b0444a0c186

        • memory/1120-1-0x0000000002190000-0x0000000002196000-memory.dmp

          Filesize

          24KB

        • memory/1120-2-0x0000000002190000-0x0000000002196000-memory.dmp

          Filesize

          24KB

        • memory/1120-3-0x00000000021B0000-0x00000000021B6000-memory.dmp

          Filesize

          24KB

        • memory/5072-19-0x00000000004F0000-0x00000000004F6000-memory.dmp

          Filesize

          24KB

        • memory/5072-21-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/5072-17-0x0000000002190000-0x0000000002196000-memory.dmp

          Filesize

          24KB