Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/02/2024, 02:54

General

  • Target

    2024-02-28_ba15e328719176a795aa0b4ba4dd6a9f_cryptolocker.exe

  • Size

    40KB

  • MD5

    ba15e328719176a795aa0b4ba4dd6a9f

  • SHA1

    e3bc34171d6b361d07a8fc6ea9468c9938229357

  • SHA256

    0e492448fe23e882daf87a3bfe1b2b6768c1bb2d39152a3328ee763a4e7c3da0

  • SHA512

    b70f2ba0557cc13161333be8310b5bf96e0a3fe73fa496330272e5418353384ee4f3eac27ddc919ac41e426b1c365303dd1e8b8e3f9cd1f49e45c8137996168e

  • SSDEEP

    384:60VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26aIIcVRYpetOOtEvwDpjqIGRmdHzOOZ:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/7

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Detects executables built or packed with MPress PE compressor 5 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-28_ba15e328719176a795aa0b4ba4dd6a9f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-28_ba15e328719176a795aa0b4ba4dd6a9f_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:1300

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          40KB

          MD5

          ee421a4ebd51dd071978c0550b3b0d98

          SHA1

          bfdba850f0d1ed5e1a45c6a80ccde3dfa0b09853

          SHA256

          08a0e66e51cfdf47b0db4c7c32a3c61ba14eb3f39cef16486ce8cf93199a5538

          SHA512

          9d548cd0893c178132f0aa32855b761a8bcb2c769f6b5bda3b1b6e2f26c03efddb29ae3c52342553d31e48ef89f1a4333d70271abdb2837c059983f6e78e2c42

        • memory/1300-18-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/1300-20-0x00000000006D0000-0x00000000006D6000-memory.dmp

          Filesize

          24KB

        • memory/1300-23-0x00000000006B0000-0x00000000006B6000-memory.dmp

          Filesize

          24KB

        • memory/1300-53-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/2924-0-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/2924-1-0x00000000005A0000-0x00000000005A6000-memory.dmp

          Filesize

          24KB

        • memory/2924-2-0x00000000005A0000-0x00000000005A6000-memory.dmp

          Filesize

          24KB

        • memory/2924-3-0x00000000005C0000-0x00000000005C6000-memory.dmp

          Filesize

          24KB

        • memory/2924-17-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB