Analysis

  • max time kernel
    156s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-02-2024 21:24

General

  • Target

    2024-02-24_0f666a3685537396cdedb73f375f8b0a_cryptolocker.exe

  • Size

    386KB

  • MD5

    0f666a3685537396cdedb73f375f8b0a

  • SHA1

    7c753fe79755a2e45145028b872cad6cb6f86c85

  • SHA256

    429bcb60c5fd543540e2c89a04c878f78f39c886bf856de05bcb571aecce8c47

  • SHA512

    fec5b0ec02c51a7ae5c96b6f21f8349446d80ed2af853d4bc1456e5dcb50a31f1e26727464c0bc099fbd793d8201d1cab9f915eeafb19a277ea3c94affb93bc0

  • SSDEEP

    6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXI:nnOflT/ZFIjBz3xjTxynGUOUhXI

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-24_0f666a3685537396cdedb73f375f8b0a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-24_0f666a3685537396cdedb73f375f8b0a_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1004
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    386KB

    MD5

    ac382f5d21de893283d0fad6007080ce

    SHA1

    3c488739af17adfcb7ffca5d8c91d724b11e4b35

    SHA256

    f69f76002b946d48605ef5a3d75e43f4f36d0e05885b0ca51d3f1e56f0601103

    SHA512

    a3508850a1b8f9db71a1eebd90dbf8a9fe6dd1eceadcd0a0bcabebdc792059c726e55e3bfc12bbf10738a69d0a58a00e8d6cad174a7f6082d6467339ba3284eb

  • memory/1004-0-0x0000000002260000-0x0000000002266000-memory.dmp

    Filesize

    24KB

  • memory/1004-1-0x0000000002260000-0x0000000002266000-memory.dmp

    Filesize

    24KB

  • memory/1004-2-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB

  • memory/1636-17-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/1636-19-0x0000000000700000-0x0000000000706000-memory.dmp

    Filesize

    24KB