Analysis

  • max time kernel
    152s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-02-2024 17:26

General

  • Target

    2024-02-19_2143481eab83e07a291850099fe1c104_cryptolocker.exe

  • Size

    34KB

  • MD5

    2143481eab83e07a291850099fe1c104

  • SHA1

    9db5987590aa9987c92c17697f4f7c8103849dd1

  • SHA256

    51a4341ce43d90df56468a4a2764fab298f5256312ffee16e80867528f335fd3

  • SHA512

    3080002bba98e59ebda6a74fe0e1b0ae28640fe9f7aede84228503dca70c39afe1f9c301d52bb2a3a782ce2b34b2cc7364dc4eaca49c4f33790f34d8007b1bcb

  • SSDEEP

    384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUqMV6U8zKvGaLigYdO:bA74zYcgT/Ekd0ryfj86U8zbUYdO

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-19_2143481eab83e07a291850099fe1c104_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-19_2143481eab83e07a291850099fe1c104_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4432
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:3460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    34KB

    MD5

    d072812228e71236e81e2a44193f5902

    SHA1

    b4d7f1639f3833e0aba89ae0120d781440e6d9f3

    SHA256

    2d1a7d8ac358ecdbd3bdd85650421848ef5d59ca3dcf37ee65381a98e97f8742

    SHA512

    45dc7d6564f34e7dc9bba0589561172de1468d7a2f7dc135dec514aaabd781791a393f6665286b72d0bc9061d903082ece34193135edeb140ed8da5a906a2766

  • memory/3460-17-0x0000000002280000-0x0000000002286000-memory.dmp

    Filesize

    24KB

  • memory/3460-18-0x0000000002210000-0x0000000002216000-memory.dmp

    Filesize

    24KB

  • memory/4432-0-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/4432-1-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/4432-2-0x0000000002400000-0x0000000002406000-memory.dmp

    Filesize

    24KB