Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 02:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-06_338e9a522c9fff9ba2f4accbb0a9d6bd_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-06_338e9a522c9fff9ba2f4accbb0a9d6bd_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-06_338e9a522c9fff9ba2f4accbb0a9d6bd_cryptolocker.exe
-
Size
68KB
-
MD5
338e9a522c9fff9ba2f4accbb0a9d6bd
-
SHA1
b5a631c0b1bda54ef7530ea552b5afa021a3ce0b
-
SHA256
4c9852bfa07008a544a8ae89cb58f4d92dd4a09d77efcc0f0fe4445053aa6c2f
-
SHA512
fab799ad8f9fd95a2aba02fc144b8ea938b73355e0ea3b9e780612ab7a9e50ec2180b3daa95d701f05940e227f7d87e1466e30812527b92929a94764751e48f4
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4ZPsED3VK2+ZtyOjgO4r9vFAg2rq2g1B/Rn:vj+jsMQMOtEvwDpj5HZYTjipvF24f
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000400000001e5eb-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x000400000001e5eb-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation 2024-03-06_338e9a522c9fff9ba2f4accbb0a9d6bd_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2472 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1336 wrote to memory of 2472 1336 2024-03-06_338e9a522c9fff9ba2f4accbb0a9d6bd_cryptolocker.exe 87 PID 1336 wrote to memory of 2472 1336 2024-03-06_338e9a522c9fff9ba2f4accbb0a9d6bd_cryptolocker.exe 87 PID 1336 wrote to memory of 2472 1336 2024-03-06_338e9a522c9fff9ba2f4accbb0a9d6bd_cryptolocker.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-06_338e9a522c9fff9ba2f4accbb0a9d6bd_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-06_338e9a522c9fff9ba2f4accbb0a9d6bd_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD525ea0aa7e6fe98baed7c4743defe312b
SHA1293ad8fdd17eb8d3e9df03602facf28cfb913e34
SHA2562daef6e1d1dc145d6eb20799558b2cbce870ee425f3747b8117b09739a01cb17
SHA5120de69bb13a80e6d5c0a4837bcf6947e3ed30aa28d091b6ad4a789317522ed74ab4370dd9bf302d22de83409169848100e74d3d742ab6d78799eed6e900eb96b4