Analysis

  • max time kernel
    90s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2024, 20:11

General

  • Target

    2024-02-12_ab3c0e033b38a92c2e719b7ea8f5b07d_cryptolocker.exe

  • Size

    59KB

  • MD5

    ab3c0e033b38a92c2e719b7ea8f5b07d

  • SHA1

    ae88063b83a5a3a3638c526d607a35539718287f

  • SHA256

    a64d51e8d2a6902121287a27f5d6f438b822dd1658152e3ac60a1d8405397c2f

  • SHA512

    9f7d0fcac53fc78399845fce357da21464d64f817fad125cdb1c35a231bd2b79172c649179f127caf9c0cf129f2a730d1c7b7dc47769f6ef53c67534f1a11365

  • SSDEEP

    1536:ZzFbxmLPWQMOtEvwDpj38lD/cMAT+lBhq:ZVxkGOtEvwDpjx

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-12_ab3c0e033b38a92c2e719b7ea8f5b07d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-12_ab3c0e033b38a92c2e719b7ea8f5b07d_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    59KB

    MD5

    eed632e07366561c91927c89dfb327a0

    SHA1

    06c89d7ec3fb04a2ea275ba03476d85cb2c8e225

    SHA256

    147eb2ade83a87737fcea3597c0f8889edd6e2a0425a3f6dc8c33650862ec53e

    SHA512

    5d9aae18190690d8f4622739b5ed0630c9ccc885f65f44488dbd0e4ff1a7db938f9c281ece3878ef2fa42a5127d4b45425a5fdf3bf54f3b20828fa79155f6462

  • memory/828-16-0x00000000004E0000-0x00000000004E3000-memory.dmp

    Filesize

    12KB

  • memory/828-18-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB

  • memory/828-24-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/828-53-0x00000000004E0000-0x00000000004E3000-memory.dmp

    Filesize

    12KB

  • memory/4560-0-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/4560-1-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/4560-2-0x00000000021B0000-0x00000000021B6000-memory.dmp

    Filesize

    24KB