Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07-03-2024 23:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-07_b5ac90d675555e9298fe451d411b9f5a_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-07_b5ac90d675555e9298fe451d411b9f5a_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-07_b5ac90d675555e9298fe451d411b9f5a_cryptolocker.exe
-
Size
40KB
-
MD5
b5ac90d675555e9298fe451d411b9f5a
-
SHA1
a32e5b15a80eb24d8e6f3477d1d3b17b39ba6532
-
SHA256
4059e1084b7e064ba456a1d6220d690b58ed709ce26dbda959a8f2124459e089
-
SHA512
cd16a202148331d0e5d2fe1a14a2b971a6b4ddf199800d32e2bdd800919acc7b45ce9b4991df25ea32f156a092961785c0ebfc530e9b94755e7462e8c86b932a
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4REL+cc660SV:vj+jsMQMOtEvwDpj5HW5E
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023213-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023213-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 2024-03-07_b5ac90d675555e9298fe451d411b9f5a_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4760 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5112 wrote to memory of 4760 5112 2024-03-07_b5ac90d675555e9298fe451d411b9f5a_cryptolocker.exe 83 PID 5112 wrote to memory of 4760 5112 2024-03-07_b5ac90d675555e9298fe451d411b9f5a_cryptolocker.exe 83 PID 5112 wrote to memory of 4760 5112 2024-03-07_b5ac90d675555e9298fe451d411b9f5a_cryptolocker.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_b5ac90d675555e9298fe451d411b9f5a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-07_b5ac90d675555e9298fe451d411b9f5a_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:4760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5c0d1fe3d95e9faa8fe8b4fc47bdb8a12
SHA12fc9ee89d13b7016aa96ce6a7ce3f6c8d2c8bba8
SHA25663bf32cba5389fb568bbe9e294502f2510413294cf784a1ae8a02ad1daaf0d73
SHA5124877b55534f3806979f79962a0ea03ae35f7a16943941ed10413d97c95410b5a0ef37769c557e703a07fa6cfe7fad3a2c2aeb871769ba5af96857d9b495cecfe