Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2024, 23:29

General

  • Target

    2024-02-24_a56cb80c92601a6fd5c0ff3c5ff61eb6_cryptolocker.exe

  • Size

    38KB

  • MD5

    a56cb80c92601a6fd5c0ff3c5ff61eb6

  • SHA1

    a69ba28c3fc8c8e368491d85af0ed22e132bfe1e

  • SHA256

    dedfb357ebc86f411656b2703a5a3599173b2214021200ffd31188bfe05acfe5

  • SHA512

    88535982624db6c9174734d3602f75932a0585b665dcbeebec36ee38419538aa811b0e200d357d876ce071afbed44b6a26d0915a6d11478e5c9ce1461902ba91

  • SSDEEP

    384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf0w3sp8u5cZnfXE:bgX4zYcgTEu6QOaryfjqDDw3sCu5mXE

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-24_a56cb80c92601a6fd5c0ff3c5ff61eb6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-24_a56cb80c92601a6fd5c0ff3c5ff61eb6_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4480
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2352

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          38KB

          MD5

          8aeee008a83db8d018b0614ea7ebbd82

          SHA1

          9f86d9ad07687a7c539da7e162fcbd1f8a253c37

          SHA256

          36f38a8bff6eac1b88aeb02bec5b94175e6fbe66ca038cc05b58d3bc334a458c

          SHA512

          7ef87af28b514473cbb0a6662462d16c0069f4a8079990433bfa852358c639e74d1b2dc67db3b489127a2368d4a350e57382822ef187a70e1a41ec6bc0867756

        • memory/2352-19-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

          Filesize

          24KB

        • memory/2352-17-0x0000000003150000-0x0000000003156000-memory.dmp

          Filesize

          24KB

        • memory/4480-0-0x0000000002D60000-0x0000000002D66000-memory.dmp

          Filesize

          24KB

        • memory/4480-1-0x0000000002D60000-0x0000000002D66000-memory.dmp

          Filesize

          24KB

        • memory/4480-2-0x0000000003010000-0x0000000003016000-memory.dmp

          Filesize

          24KB