Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-02-2024 01:02

General

  • Target

    2024-02-22_f5e4c97dea465e054e8cbb939fe96338_cryptolocker.exe

  • Size

    37KB

  • MD5

    f5e4c97dea465e054e8cbb939fe96338

  • SHA1

    2142f20422b935d6136d19b2d454526a7bc77fe5

  • SHA256

    59c2d5f2b03521dd5ca546a733fc94cb1ba26468a21a9948b8b03d9749182a1d

  • SHA512

    56c87c60569915bf7db9d15952d4c38fe9bec0fb2406b07b7bbc5808b288cce7f4a291546488d5f94aa193e63801ebed18508e589bb3d43910f75ec154a6dfe7

  • SSDEEP

    384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf0w3sp8u5cZnfz+:bgX4zYcgTEu6QOaryfjqDDw3sCu5mz+

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-22_f5e4c97dea465e054e8cbb939fe96338_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-22_f5e4c97dea465e054e8cbb939fe96338_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3296
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    38KB

    MD5

    e080396a09ff33d9afecb60f959693a1

    SHA1

    ec6ea909d221a11705a94a18b9613e181cb3c371

    SHA256

    996afa5ec12640c2e40ddacd61092bd330188f634329ca12c985376f840a05dd

    SHA512

    262d057c56e5f4e0fbb5e0372b2639f50021756f7e0ba328ac54f983b7909dffb21b032fdc21e96f55e20492c93b6beece1ba6432fcc2c47d2dc1f5fdb866f63

  • memory/1536-17-0x00000000020D0000-0x00000000020D6000-memory.dmp

    Filesize

    24KB

  • memory/1536-23-0x0000000001F90000-0x0000000001F96000-memory.dmp

    Filesize

    24KB

  • memory/3296-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/3296-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/3296-2-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB