Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/02/2024, 05:45

General

  • Target

    2024-02-28_fbe5584e2a9468f8565f314e3162857c_cryptolocker.exe

  • Size

    61KB

  • MD5

    fbe5584e2a9468f8565f314e3162857c

  • SHA1

    e638544a79abb5cc6c1361bd2ee7d0573e974c25

  • SHA256

    181c56341da9aeba00ad999ea6290f9d2419853cb54925876e3859a8eac6d1b4

  • SHA512

    f9b23ef5bb9cc559ed39e0a494e39e13f7d12e890cb858d9f1f2f7aca8a9296c2eb82f1b31224df34b2fbbfad79eb5ec404509e24c6c99d27811cce3294d3b12

  • SSDEEP

    768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4hdCY8EQMjpi/Wpi3B3URiLnuoUwUsfqB16:vj+jsMQMOtEvwDpj5Hy7B3gG8xzUA2

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-28_fbe5584e2a9468f8565f314e3162857c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-28_fbe5584e2a9468f8565f314e3162857c_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:2388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    61KB

    MD5

    cea7c43f16754d07eb2ac1e5c0beff5a

    SHA1

    78bd995606a7b062763289bb539595bfc17a4dc1

    SHA256

    91dc49251edbf5137dc169497f87686dacab28efbd2c193af6563605b32d6ba1

    SHA512

    224e51e9c7a55d0c6a77c7cab814fd5794304bbebe2622a0a2f8beb514fedf9b60745db1ff551b97870530df169b037bc3b8d79c0eea77dece9d63409ddf8dfc

  • memory/2388-18-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/2388-17-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/2940-0-0x0000000002310000-0x0000000002316000-memory.dmp

    Filesize

    24KB

  • memory/2940-1-0x0000000002310000-0x0000000002316000-memory.dmp

    Filesize

    24KB

  • memory/2940-2-0x0000000002230000-0x0000000002236000-memory.dmp

    Filesize

    24KB