Analysis

  • max time kernel
    144s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-02-2024 09:46

General

  • Target

    2024-02-22_69f59059cd81e87b0c4e847deb1f08f1_cryptolocker.exe

  • Size

    40KB

  • MD5

    69f59059cd81e87b0c4e847deb1f08f1

  • SHA1

    6f9481c4b97c177f769f9b7f77b4e5e8775a660f

  • SHA256

    ba4d80173992c015f6f76f844c7acdeb4616825cdf71151f290f79e19ef6fda3

  • SHA512

    50e89aa268ba90fce331426c86ae14e0dfb04e4ec5424d441d5d6c87c3f1a7f540e44ec61c11d5c8ce6ae54ff284fc48c15f7a365d534bb394e3a6eb1e5b15e4

  • SSDEEP

    768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLenQL3bTbQCC:ZzFbxmLPWQMOtEvwDpjLeU3kCC

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-22_69f59059cd81e87b0c4e847deb1f08f1_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-22_69f59059cd81e87b0c4e847deb1f08f1_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    41KB

    MD5

    4770af2ba630e2cfa6515d3a3e1997e6

    SHA1

    f45e7962e9cc2a1eb7453111d7dd9aee64b80c1a

    SHA256

    3ea05263b7673be175d84cfc69af79089bbb9e85ddb81be7d6efad77195854dd

    SHA512

    903c729c34a335bdb97d73d0c05ad7b5eec78f87700e8455c89526805c47e1de3fa47ec4e3f36fbb5de6f864d50860c6a792aa9a1f56ca9f4eeb479e491ca72c

  • memory/528-17-0x00000000004E0000-0x00000000004E3000-memory.dmp

    Filesize

    12KB

  • memory/528-19-0x0000000002070000-0x0000000002076000-memory.dmp

    Filesize

    24KB

  • memory/528-21-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/1944-0-0x00000000006B0000-0x00000000006B3000-memory.dmp

    Filesize

    12KB

  • memory/1944-1-0x00000000006E0000-0x00000000006E6000-memory.dmp

    Filesize

    24KB

  • memory/1944-2-0x00000000006E0000-0x00000000006E6000-memory.dmp

    Filesize

    24KB

  • memory/1944-3-0x00000000021B0000-0x00000000021B6000-memory.dmp

    Filesize

    24KB

  • memory/1944-20-0x00000000006B0000-0x00000000006B3000-memory.dmp

    Filesize

    12KB