Analysis

  • max time kernel
    139s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-02-2024 10:41

General

  • Target

    2024-02-17_db15d7b15d075d5d5b26c31322426c74_cryptolocker.exe

  • Size

    62KB

  • MD5

    db15d7b15d075d5d5b26c31322426c74

  • SHA1

    44c0b4b54d92546ef22b2a28773a10ec13fb2866

  • SHA256

    197d2a9fe8aeedd7b3d6633706bd8af2065c2ef4fab8504555f7ec3ecb86994b

  • SHA512

    61583d1fe277e88e8b2376f2fef8631579372df787849723d84c70eb0e6d0542704e9372ad37f41fc392c461ac63f6447dc3a1f1af8ea8b3e8aadd399188af28

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5I52kGEKLL:6j+1NMOtEvwDpjr8ox8UDEKH

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Detects executables built or packed with MPress PE compressor 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-17_db15d7b15d075d5d5b26c31322426c74_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-17_db15d7b15d075d5d5b26c31322426c74_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4080
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    62KB

    MD5

    a6e42d60c2ae1b59179091a184b7158d

    SHA1

    e0f5c4c7830432d128eb9126ed578a61147ed1a9

    SHA256

    f47d877def3aab74b261ca17c5eea1360cb4e3481bbcd1b1f872b36d29860760

    SHA512

    83218bd49e6511335a3709cc182bd665768784d07aec8e0ea4935ba553f4524279ecd72f356c4f658b0be9e3a83a8e4df3b6f76ea1c31b4f7909844bda55f8f4

  • memory/2668-18-0x00000000020F0000-0x00000000020F6000-memory.dmp

    Filesize

    24KB

  • memory/2668-20-0x00000000020D0000-0x00000000020D6000-memory.dmp

    Filesize

    24KB

  • memory/2668-26-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/4080-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/4080-1-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/4080-2-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/4080-3-0x0000000000590000-0x0000000000596000-memory.dmp

    Filesize

    24KB

  • memory/4080-19-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB