Analysis

  • max time kernel
    142s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-02-2024 20:37

General

  • Target

    2024-02-28_56b9b4e11b8e0ad8a082595d2c7fb098_cryptolocker.exe

  • Size

    126KB

  • MD5

    56b9b4e11b8e0ad8a082595d2c7fb098

  • SHA1

    d9f25ab7d2cc44dd3cc6a2f3e9b621963d032dd6

  • SHA256

    073a61981e62c4b573e74bdea9cbe0b43eb6697f295e6822cb91275b363c6149

  • SHA512

    11ed07745c18cfefe650c7c96e8df9eda0bc7f38fdb19bc9e19030d02cf64e0a3b62391505a14e53d60d6b0d038a5ab291b89ab8f9c0cdbe8e3a1c227b07bf9c

  • SSDEEP

    1536:gUj+AIMOtEvwDpjNbwQEIPlemUhYwkkxGBpR/2:vCA9OtEvwDpjo

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-28_56b9b4e11b8e0ad8a082595d2c7fb098_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-28_56b9b4e11b8e0ad8a082595d2c7fb098_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3448
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:836
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3704 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1376

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\misid.exe

      Filesize

      126KB

      MD5

      8b652eff91eac686310487904ef1c9a8

      SHA1

      21d2fafa5aa42e97e697f281ef1f38bb95c88b34

      SHA256

      6d0af8ce42b6ee8f91ad77b3cdebffe32e894c84f3651c4ae53d3c5cd5517914

      SHA512

      6aa5f9a524cc0ee98b5d574ea88af8e4dc65c0ec07c5795930035bc7108169530bfbcbc5feeb2cfd2fd5421021307f30e9fc8512356cc7e1fd393e8879735f54

    • memory/836-17-0x00000000004D0000-0x00000000004D6000-memory.dmp

      Filesize

      24KB

    • memory/836-18-0x00000000004F0000-0x00000000004F6000-memory.dmp

      Filesize

      24KB

    • memory/3448-0-0x0000000002050000-0x0000000002056000-memory.dmp

      Filesize

      24KB

    • memory/3448-1-0x0000000002050000-0x0000000002056000-memory.dmp

      Filesize

      24KB

    • memory/3448-2-0x0000000002070000-0x0000000002076000-memory.dmp

      Filesize

      24KB