Analysis

  • max time kernel
    87s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2024, 20:07

General

  • Target

    2024-02-12_8eceb80b4cbcc25a5362f4b51aec2886_cryptolocker.exe

  • Size

    55KB

  • MD5

    8eceb80b4cbcc25a5362f4b51aec2886

  • SHA1

    7d6df5a6046552cfecee28b59bc4c98cde16a5ec

  • SHA256

    882352168cd422e5ffd6fd3160ad288897f65cf3f77f9c4537e8da50c7a58d88

  • SHA512

    bed29b3f3d3cf95af76e7d9ef4dc20753bc7cceed037e00de5941fba0e885fe0d9ac93ab314859fb3a8472cd96e99cbf3f05f38d3125be3c2b358c9d3bd04c96

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpLDWE:zj+soPSMOtEvwDpj4yD5

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • UPX dump on OEP (original entry point) 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-12_8eceb80b4cbcc25a5362f4b51aec2886_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-12_8eceb80b4cbcc25a5362f4b51aec2886_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1332
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:3016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    55KB

    MD5

    98988b227506a444714cc80c8c243a64

    SHA1

    de52f8d04c5f7f1424ea61231b2c94608cad421a

    SHA256

    7a0e52d0d58a370b30e3335df2e98cb6b66d954d217e66b84bb359ac9c54fb9e

    SHA512

    e3f9dd16a84c3af60356aabc1b584918e75ab37b80b7ccabf5bdb707a1fbcfb2402769ba4b8811762d2fc2307815b37e21651a5afa255144137a7c9e6833ba75

  • memory/1332-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1332-1-0x00000000007B0000-0x00000000007B6000-memory.dmp

    Filesize

    24KB

  • memory/1332-2-0x00000000007B0000-0x00000000007B6000-memory.dmp

    Filesize

    24KB

  • memory/1332-3-0x00000000007D0000-0x00000000007D6000-memory.dmp

    Filesize

    24KB

  • memory/1332-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3016-19-0x00000000006D0000-0x00000000006D6000-memory.dmp

    Filesize

    24KB

  • memory/3016-20-0x00000000006B0000-0x00000000006B6000-memory.dmp

    Filesize

    24KB

  • memory/3016-56-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB