Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-02-2024 16:26

General

  • Target

    2024-02-22_132fec2cbb2b059eaea6a4596d692982_cryptolocker.exe

  • Size

    65KB

  • MD5

    132fec2cbb2b059eaea6a4596d692982

  • SHA1

    376b1e10e40e59c8ef589ab36548669bd141305c

  • SHA256

    7e71476dcb5c24db41775d49d6c534eb4924af30229c6c1adf934602ec63bbf8

  • SHA512

    f8b30a6200d25eaf96ecef733f6921f48232232642f97ca739e807532b38eec0cae3a468a62617607c47274877de814c2a9c6558fb5ebf55b39afb0da0fd511b

  • SSDEEP

    1536:ZzFbxmLPWQMOtEvwDpj386Sj/WprgJN6tZdOyJ3hvLcbVrF:ZVxkGOtEvwDpjcawL

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-22_132fec2cbb2b059eaea6a4596d692982_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-22_132fec2cbb2b059eaea6a4596d692982_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4584
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    66KB

    MD5

    8b1aeccb35d3e36f1a2f68d172915e89

    SHA1

    16c7e225b2044aaf59bd902403e10d00b1dfa708

    SHA256

    072d80e8673181b2d0c33166df9570c98fb15d7937be0dd6c37611df526c984a

    SHA512

    b50deb412cb7ae34d63c9dcd9de1ca0ae561b93cc7c4cbce1aa9045869b866b71e3837334fc99817921d025fcf3875da77f8d4cfe1aa740c0c96baebf9bd05c5

  • memory/2064-20-0x0000000002110000-0x0000000002116000-memory.dmp

    Filesize

    24KB

  • memory/2064-19-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/4584-0-0x00000000004E0000-0x00000000004E3000-memory.dmp

    Filesize

    12KB

  • memory/4584-1-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/4584-2-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/4584-3-0x0000000002080000-0x0000000002086000-memory.dmp

    Filesize

    24KB

  • memory/4584-17-0x00000000004E0000-0x00000000004E3000-memory.dmp

    Filesize

    12KB