Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-06_8e5faa327edeb92e8b13f9faa5de8b16_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-06_8e5faa327edeb92e8b13f9faa5de8b16_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-06_8e5faa327edeb92e8b13f9faa5de8b16_cryptolocker.exe
-
Size
44KB
-
MD5
8e5faa327edeb92e8b13f9faa5de8b16
-
SHA1
e1f7c5e1ea91d45c6d4bc3cd2d41148bdb8ebfc4
-
SHA256
2c74a1a4cc5e9bcff7acf02369ab534555498dad4674be3914f0ea5cccd11fca
-
SHA512
98f770b336191390075e5195a69ccbfb1280583cf0f2eecf1eab6723c71c29ff41e2e28c9618faf9efb56774ae7e1ba065b4d7af46cc8872125eebe1ab221900
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4REL+cc66nkpR4:vj+jsMQMOtEvwDpj5HW5Iiq
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000700000001ebc7-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x000700000001ebc7-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation 2024-03-06_8e5faa327edeb92e8b13f9faa5de8b16_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 64 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3932 wrote to memory of 64 3932 2024-03-06_8e5faa327edeb92e8b13f9faa5de8b16_cryptolocker.exe 90 PID 3932 wrote to memory of 64 3932 2024-03-06_8e5faa327edeb92e8b13f9faa5de8b16_cryptolocker.exe 90 PID 3932 wrote to memory of 64 3932 2024-03-06_8e5faa327edeb92e8b13f9faa5de8b16_cryptolocker.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-06_8e5faa327edeb92e8b13f9faa5de8b16_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-06_8e5faa327edeb92e8b13f9faa5de8b16_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:64
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD53688ba9c04dd70ef49a62b629da16054
SHA1358ab85ea68ab86806e3ae545f9a599cfca481dc
SHA2561e44e011e29ff9d3e2b994c5675049a94090ddaa9c38cafd456abe9f461e4c8c
SHA512131fb9862502ecb6031396ff1f5b653c98e3a4153bc9c916c796d53c7a41df639665f4a7d772f5538c1513988bcb728a4d168de337136fe7b49dcfd69eb82e15