Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-02-2024 08:37

General

  • Target

    2024-02-29_60ac56d9be95310dc4dea9c046cf9ed8_cryptolocker.exe

  • Size

    47KB

  • MD5

    60ac56d9be95310dc4dea9c046cf9ed8

  • SHA1

    5dd18d0fc2d2550ff446454198f81cc3d035d312

  • SHA256

    648505004d164c0394cd7c931297d9eb26092c00a1550b67002debdafa47e0cb

  • SHA512

    960ff8931ebf57d0c16d420526398ea5dc217f2580e491873bd7ed1ca06e53c05d324d7d8045966e4fb78961b4f8f428744b581659120f6f25cf5c31d19f3f2f

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37YbDu5z/hvQku:bgGYcA/53GAA6y37nbU

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-29_60ac56d9be95310dc4dea9c046cf9ed8_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-29_60ac56d9be95310dc4dea9c046cf9ed8_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:4556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    47KB

    MD5

    ec252a1d73f22b0766b1f7dea4ba4282

    SHA1

    754afbe61374f38f1bcde33857ea4fa62a6bbadd

    SHA256

    dfb0e0ecc570dda646684af37fc9e1338f0d2474ca0f9b39ac2d929b6904ce36

    SHA512

    f635346cd10711640a4508692aac7b4c09780ae69d76423d0017906bd190c2cd86423743077ce38234c43b105132369c300b87adec257d2b798a7f0339999e41

  • memory/2364-0-0x0000000002D60000-0x0000000002D66000-memory.dmp

    Filesize

    24KB

  • memory/2364-1-0x0000000002D60000-0x0000000002D66000-memory.dmp

    Filesize

    24KB

  • memory/2364-2-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/4556-17-0x0000000002240000-0x0000000002246000-memory.dmp

    Filesize

    24KB

  • memory/4556-18-0x0000000002210000-0x0000000002216000-memory.dmp

    Filesize

    24KB