Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/02/2024, 03:24

General

  • Target

    2024-02-20_14521dae4976dc2c684da4cb2d4a032f_cryptolocker.exe

  • Size

    125KB

  • MD5

    14521dae4976dc2c684da4cb2d4a032f

  • SHA1

    9936016d8a65b828a312cf2da031c611731a9689

  • SHA256

    2f42c597b548524693cc9e0447abcb14c02993b87def953289339986db43acfd

  • SHA512

    174b18f3a23b40879867af8622f8792d27bdb0d6e66b77ba43bbe94aed386c8ff8ceeed8a51da60ca1699064c24004c3e77843dec1ecb4b7439f9c8729633d5f

  • SSDEEP

    1536:gUj+AIMOtEvwDpjNbwQEIPlemUhYwkkxGBph:vCA9OtEvwDpjd

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-20_14521dae4976dc2c684da4cb2d4a032f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-20_14521dae4976dc2c684da4cb2d4a032f_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    125KB

    MD5

    a018e3b581bcf0ce092ab7bc6e07e79b

    SHA1

    f21210274fd2f440b3ad4471950dce0221f00f9f

    SHA256

    a94a6226775e6998672ae42dce9ef4dbcbffbddae12f389a8b0b2f61b036279c

    SHA512

    bd231d586e069e834b8a4679cbdc70769ac9b487bb436aa6cca9381b55961f3bc91e03fc0aa44fa34b1aa3ef0911ed782d04612f2c091b753cba075f5337b17f

  • memory/1880-0-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/1880-1-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/1880-2-0x0000000002230000-0x0000000002236000-memory.dmp

    Filesize

    24KB

  • memory/3028-17-0x00000000007D0000-0x00000000007D6000-memory.dmp

    Filesize

    24KB

  • memory/3028-19-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB