Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2024, 16:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-22_4816b17ddc80cb6be0d76438c57f6194_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-22_4816b17ddc80cb6be0d76438c57f6194_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-22_4816b17ddc80cb6be0d76438c57f6194_cryptolocker.exe
-
Size
75KB
-
MD5
4816b17ddc80cb6be0d76438c57f6194
-
SHA1
f910c11da30e5e0e740e3b1046313e3e8dfec667
-
SHA256
7bd209df7e7ddd6daf9efd141de761e0538d0a059c7b97d7d5e961f3188e32b2
-
SHA512
2c7c749fd851f49d1d68eba73996bf2dfc55095f0eaf9de9622aa69c073914b201eac4609fe710197f58a15cd0b5fbe7d01511c0164df5fdf904ffb3b4b9b1a2
-
SSDEEP
1536:ZzFbxmLPWQMOtEvwDpj386Sj/WprgJN6tZdOyJ3Ku3b:ZVxkGOtEvwDpjcav
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023209-13.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\Control Panel\International\Geo\Nation 2024-02-22_4816b17ddc80cb6be0d76438c57f6194_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3764 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3704 wrote to memory of 3764 3704 2024-02-22_4816b17ddc80cb6be0d76438c57f6194_cryptolocker.exe 88 PID 3704 wrote to memory of 3764 3704 2024-02-22_4816b17ddc80cb6be0d76438c57f6194_cryptolocker.exe 88 PID 3704 wrote to memory of 3764 3704 2024-02-22_4816b17ddc80cb6be0d76438c57f6194_cryptolocker.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-22_4816b17ddc80cb6be0d76438c57f6194_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-22_4816b17ddc80cb6be0d76438c57f6194_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:3764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD57c9b2dd69af763ce4d7e83e67fe1e391
SHA10cee08668b9343eb276883898edd5bdc45193c43
SHA256deb80525a226e5cb80896b4799432058bdf1bcdbe9d69e5a9e7479de16d95acb
SHA5120001a61fc7df84665d7b5c30a96a452c64eaa92948cc48b2ecbcd3c5a3edd22e7589cd2078e56d3a4a48c3bfc7b08ba59b01d41ddca5a975d08c7b84bdbcddd8