Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/02/2024, 20:29

General

  • Target

    2024-02-18_28b4645be1b2e510c61e0994b0393ef1_cryptolocker.exe

  • Size

    40KB

  • MD5

    28b4645be1b2e510c61e0994b0393ef1

  • SHA1

    4ad56497ec966613465a185a4c61d50be6bd20f1

  • SHA256

    5ec1dcda5f7f1ac572a02151037810005d1426d1f6ef6ed7cfe10ac12e9385a1

  • SHA512

    d035b7cf1c637dc11f5e5a028fb8a614c5df1bc61dd351344daf9d8171109adf8ccfb90ba5c1b4ea6ea608c757bbd1e0d87865a7564a110f4639d3ef456a8e23

  • SSDEEP

    768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLenQLmWOqH:ZzFbxmLPWQMOtEvwDpjLeUHOI

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-18_28b4645be1b2e510c61e0994b0393ef1_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-18_28b4645be1b2e510c61e0994b0393ef1_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:4844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    40KB

    MD5

    df2204328be881db8c0c704150c216ea

    SHA1

    72d86a107f7006ca0c4ad6da1519d6a86ca9ee8b

    SHA256

    85cc45ff2cc848da59a2d40bbb459fe27c76958f7e1d29fc302a0f42c89749b0

    SHA512

    37db1d9dbc0ed4d9eb5cac8d4ed5bf9eb42734704a1f86a2ad1fc25e0b21ca2a74b114ffe67cb1e3b501ada653846649d4f11fe6d509e35c66ccbe31c442517d

  • memory/1916-0-0x00000000004E0000-0x00000000004E3000-memory.dmp

    Filesize

    12KB

  • memory/1916-1-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB

  • memory/1916-2-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB

  • memory/1916-3-0x0000000000600000-0x0000000000606000-memory.dmp

    Filesize

    24KB

  • memory/1916-17-0x00000000004E0000-0x00000000004E3000-memory.dmp

    Filesize

    12KB

  • memory/4844-18-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB

  • memory/4844-20-0x0000000000760000-0x0000000000766000-memory.dmp

    Filesize

    24KB

  • memory/4844-22-0x0000000000740000-0x0000000000746000-memory.dmp

    Filesize

    24KB

  • memory/4844-27-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB