Resubmissions

23/02/2024, 19:57

240223-ypklkaga77 7

23/02/2024, 19:50

240223-ykqa9agh4t 10

Analysis

  • max time kernel
    116s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/02/2024, 19:50

General

  • Target

    2024-02-23_89fa18b6e0de0b0613263a7f7c2552b5_cryptolocker.exe

  • Size

    47KB

  • MD5

    89fa18b6e0de0b0613263a7f7c2552b5

  • SHA1

    18cd8f6931f61c74b3bc8fae886e2ffaa8f99af3

  • SHA256

    0da959b54501996e301c987df30231a606047dc0cc095ef03278c05881818338

  • SHA512

    22322d7651b5f3d2c4120bf23baf9d7fdb9ce0d2e459e8e2b4d1b8f2dc256f25cfec4717b3fff5e69e95a6177504fe67ccb2be9dab724b2986cf6d43b433b1ff

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Yl6dIDaI:bgGYcA/53GAA6y37Q6dIV

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-23_89fa18b6e0de0b0613263a7f7c2552b5_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-23_89fa18b6e0de0b0613263a7f7c2552b5_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4432
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    47KB

    MD5

    3b1885bc6186ba2aeb7df6a8900362af

    SHA1

    631ea468376659cd6dfbd3e4a5abeb776aff90db

    SHA256

    2d3b77d730a3d4cb1f08e0bc35039589fa1affc9ed26c54786a335c7d3f0a0be

    SHA512

    a5cb3383c86fe7308ba1ec188d0328cc60d11d651be3da98a71231db11d92c66ff6797b5702013a266c66b074a5bbf0f570b9e63fc8a131aee27321d7e20dc85

  • memory/404-18-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/404-17-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/4432-0-0x0000000002250000-0x0000000002256000-memory.dmp

    Filesize

    24KB

  • memory/4432-1-0x0000000002250000-0x0000000002256000-memory.dmp

    Filesize

    24KB

  • memory/4432-2-0x0000000002400000-0x0000000002406000-memory.dmp

    Filesize

    24KB