Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-06_c2dcc3d32e40f6540a15c0194540500a_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-06_c2dcc3d32e40f6540a15c0194540500a_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-06_c2dcc3d32e40f6540a15c0194540500a_cryptolocker.exe
-
Size
126KB
-
MD5
c2dcc3d32e40f6540a15c0194540500a
-
SHA1
f9b1bba1da3b1741b0ad9a239e43dfc4f4a864ae
-
SHA256
866c577470739f356d968b012dcd0ad8cfb86aa9f3f53bf73f088b571e5d9c32
-
SHA512
fa395c2212eca02a513640616a9a1db8c639a47d687629e65ba9e57ff0e7043b11b85039527e703b300c59f1c08b9a3984530d408958b741be15dbf5808271f2
-
SSDEEP
1536:gUj+AIMOtEvwDpjNbwQEIPlemUhYwkkxGBpR/B:vCA9OtEvwDpjj
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0009000000023142-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x0009000000023142-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation 2024-03-06_c2dcc3d32e40f6540a15c0194540500a_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4916 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4108 wrote to memory of 4916 4108 2024-03-06_c2dcc3d32e40f6540a15c0194540500a_cryptolocker.exe 89 PID 4108 wrote to memory of 4916 4108 2024-03-06_c2dcc3d32e40f6540a15c0194540500a_cryptolocker.exe 89 PID 4108 wrote to memory of 4916 4108 2024-03-06_c2dcc3d32e40f6540a15c0194540500a_cryptolocker.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-06_c2dcc3d32e40f6540a15c0194540500a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-06_c2dcc3d32e40f6540a15c0194540500a_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:4916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD5ea633d9975c3dbbb976839f1f20a0ef0
SHA1d0e17904ea6692394548a0e32f92dfa7719af3d1
SHA2569f3d0521f05e61d8f2258a57ecdd1c502e613d588052f7a49934e76e9318ef62
SHA5125eb3b16652e0f0f579b3a340cb72d80c470301f5532f5aaa19c9476f75234f5f52677648dae35def318d7c6f798e1f673ff3f03d0fa0815e2c2e0d510636d6d0