Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_53179e3e7f2396de87df4e977ae9ea0f_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_53179e3e7f2396de87df4e977ae9ea0f_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-23_53179e3e7f2396de87df4e977ae9ea0f_cryptolocker.exe
-
Size
96KB
-
MD5
53179e3e7f2396de87df4e977ae9ea0f
-
SHA1
43a5c21815e1764976e65d907086716263ea5c85
-
SHA256
693fb65875783e7c09f388a9f93d3af2895a4511bed086a0fa5fa868f7518990
-
SHA512
bff64db90bd1e30f206d9bce22b001a5a0d34443192af33125b11bec98a7923f15bcab956604010486091864463788f0c1b3ecfa67762f11ba4a71513616c18f
-
SSDEEP
768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZ7uyA36S7MpxRiWNa9mktJvfT35y:xj+VGMOtEvwDpjubwQEIiVmkfI
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral2/memory/2260-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x00060000000230f5-13.dat CryptoLocker_rule2 behavioral2/memory/2260-19-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral2/memory/4080-26-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral2/memory/2260-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral2/files/0x00060000000230f5-13.dat CryptoLocker_set1 behavioral2/memory/2260-19-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral2/memory/4080-26-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
Detects executables built or packed with MPress PE compressor 4 IoCs
resource yara_rule behavioral2/memory/2260-0-0x0000000000500000-0x0000000000510000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x00060000000230f5-13.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/2260-19-0x0000000000500000-0x0000000000510000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4080-26-0x0000000000500000-0x0000000000510000-memory.dmp INDICATOR_EXE_Packed_MPress -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation 2024-02-23_53179e3e7f2396de87df4e977ae9ea0f_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4080 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2260 wrote to memory of 4080 2260 2024-02-23_53179e3e7f2396de87df4e977ae9ea0f_cryptolocker.exe 85 PID 2260 wrote to memory of 4080 2260 2024-02-23_53179e3e7f2396de87df4e977ae9ea0f_cryptolocker.exe 85 PID 2260 wrote to memory of 4080 2260 2024-02-23_53179e3e7f2396de87df4e977ae9ea0f_cryptolocker.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-23_53179e3e7f2396de87df4e977ae9ea0f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-23_53179e3e7f2396de87df4e977ae9ea0f_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:4080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD52acc0c8896edd56c754cbec9d5ebcc28
SHA1ed17268d622d1139a4ba9e294af67ac57e35fedd
SHA256ac2216ae6ea74c0c72e871c4e584d01cb7c16a35ab730de56185ab06d5275338
SHA512e58adf78e6f09cf12489c3349b4def16be41c94a3a8b67f460daf12cebb16ea471c149c2f119d54cf8a118984e002e22384748a84d744603c288be202a55f773