Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 04:46
Behavioral task
behavioral1
Sample
2024-02-29_4582ed3d8217d6c5ae80de47faaefc31_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-29_4582ed3d8217d6c5ae80de47faaefc31_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-29_4582ed3d8217d6c5ae80de47faaefc31_cryptolocker.exe
-
Size
61KB
-
MD5
4582ed3d8217d6c5ae80de47faaefc31
-
SHA1
c04758345c0e5f8fd7cfdad948abe63b800f0a9d
-
SHA256
ce6386af7a0e5608a824a97ac59ce703706110fdb525eb48b3804b7e8354e94d
-
SHA512
4b997937a7d8b0b7dcd3f2640eb2f7f08df89c3624c7802f70f69bdac9fbbd0d51c795614461096d410183d862b5d1b6746dd9e03a95c63fcdfe8cc8ce033f03
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVwQ:zj+soPSMOtEvwDpj4kpmeLmnd
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral2/memory/4224-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x000700000001ebc7-13.dat CryptoLocker_rule2 behavioral2/memory/4224-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral2/memory/3708-54-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral2/memory/4224-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral2/files/0x000700000001ebc7-13.dat CryptoLocker_set1 behavioral2/memory/4224-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral2/memory/3708-54-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral2/memory/4224-0-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral2/files/0x000700000001ebc7-13.dat UPX behavioral2/memory/4224-17-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral2/memory/3708-54-0x0000000000500000-0x0000000000510000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation 2024-02-29_4582ed3d8217d6c5ae80de47faaefc31_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation misid.exe -
Executes dropped EXE 1 IoCs
pid Process 3708 misid.exe -
resource yara_rule behavioral2/memory/4224-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x000700000001ebc7-13.dat upx behavioral2/memory/4224-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3708-54-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4224 wrote to memory of 3708 4224 2024-02-29_4582ed3d8217d6c5ae80de47faaefc31_cryptolocker.exe 90 PID 4224 wrote to memory of 3708 4224 2024-02-29_4582ed3d8217d6c5ae80de47faaefc31_cryptolocker.exe 90 PID 4224 wrote to memory of 3708 4224 2024-02-29_4582ed3d8217d6c5ae80de47faaefc31_cryptolocker.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-29_4582ed3d8217d6c5ae80de47faaefc31_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-29_4582ed3d8217d6c5ae80de47faaefc31_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD56783a435aeb6f9f11bde9fddfb4458be
SHA115218ba7544219aa7c54bd245c02d0ea9d8ad374
SHA256fac7ab3d1f4427a3e0200d25c727e0e0573f305ed3d5878ef604c31be2ea78d6
SHA512e6f8debb4019ac41274336cb59302b19eea8313dbe3323f90aefbf90260dcd5254f223e06763c45e3e6f480ccf7a80392cf6098237c145caa300f90ed5e6e137