Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-02-2024 01:29

General

  • Target

    2024-02-22_51485afd0ec6ca6aecf56ddfc72851f7_cryptolocker.exe

  • Size

    34KB

  • MD5

    51485afd0ec6ca6aecf56ddfc72851f7

  • SHA1

    9e21b2c74d76defb821a39b18ad84356dd002c13

  • SHA256

    5afec0d556b7e1eb2f4c6983c0c5ded693131245b4057d27c98879bc09ed6bbe

  • SHA512

    a2a342bdd488b9980068a3fa6f4e071b6c554d1063bc2f85c04435ebd42318ab083c1726193614541ee57b4979f8342d91f8ec7a9afb2d4dcf4155c4ee3017cd

  • SSDEEP

    384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUgIunIVpeNs23mAA6lRcf:bA74zYcgT/Ekd0ryfjPIunqpeNswmHf

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-22_51485afd0ec6ca6aecf56ddfc72851f7_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-22_51485afd0ec6ca6aecf56ddfc72851f7_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3308
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:5024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    34KB

    MD5

    dd799209ab6cff89cae9b993becc15c7

    SHA1

    ed159ffb1993f6ab555cd47cf0e4e1df4c60c935

    SHA256

    ffea01b94bcae8fd50e2f063afcc84ddc1c68decbe56fe953da4fc7d72422474

    SHA512

    29ec3012f76907e6953623a479de73441cd28dd3175cf80d39dbaace97fa234dbfdbf40c3ce24fff8a168efcfc8e9b868ee7112b01cd892705337bcb21dccc1b

  • memory/3308-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/3308-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/3308-2-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB

  • memory/5024-17-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/5024-18-0x0000000000600000-0x0000000000606000-memory.dmp

    Filesize

    24KB