Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 05:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-29_4a9431981021323dd556357b75483513_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-29_4a9431981021323dd556357b75483513_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-29_4a9431981021323dd556357b75483513_cryptolocker.exe
-
Size
58KB
-
MD5
4a9431981021323dd556357b75483513
-
SHA1
983b102d7fa08854267108972130e2a274893a07
-
SHA256
89ad13b4d7db8254c73a37ffda5fc7caa8a83cceda7aa0ccb073536c738bc3d0
-
SHA512
e7aa390478c22c13c2517aaaf3964f7641a72351f942e95a4cdd0c573ddb91f7958fc4eb59aece0a1de8b9a050ffa97cdc96534ae9f76614b8a16cddb7a17d11
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjIm8lB4dCOBy/cMFqeoYPO+lxUah:ZzFbxmLPWQMOtEvwDpj38lD/cMAT+lZ
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000700000001ebc7-13.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation 2024-02-29_4a9431981021323dd556357b75483513_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation misid.exe -
Executes dropped EXE 1 IoCs
pid Process 4704 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1016 wrote to memory of 4704 1016 2024-02-29_4a9431981021323dd556357b75483513_cryptolocker.exe 89 PID 1016 wrote to memory of 4704 1016 2024-02-29_4a9431981021323dd556357b75483513_cryptolocker.exe 89 PID 1016 wrote to memory of 4704 1016 2024-02-29_4a9431981021323dd556357b75483513_cryptolocker.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-29_4a9431981021323dd556357b75483513_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-29_4a9431981021323dd556357b75483513_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:4704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD55a1fa67a0dddabefcd8f637b164d0ec0
SHA16e9fe8149bfa22c3fdf29e904f7eba4e0a1af67a
SHA2567b92a7cf204096568b4dd914b98dcbe7826c4f2b7bdd9f051a509af2f0276fd9
SHA512295d882144db718ef2757c4a2c0b6cd236133c6d878a8fa93b128ad331ab604ed5baa8ebbc41170cae7d006d9683b676454e4c3412635dbacadd5c001c99d954