Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-03-2024 06:00

General

  • Target

    2024-03-08_8a23343c8e9b8ac8a58cfbddd15103a2_cryptolocker.exe

  • Size

    60KB

  • MD5

    8a23343c8e9b8ac8a58cfbddd15103a2

  • SHA1

    a84099a73a5c5fbc03a46a2f7ff772ccb38023c3

  • SHA256

    3d91fd19488fe7e9783b978bf44001789fb935d55f2a028f68de6663cd926fa7

  • SHA512

    338109e5ba44da2077eda316d1c1d4a469f07136d4919a9e6b39145351e0fdc1cd54fde2a645dd8614a0d6667e4d9236b285ec576aa8722a4802f99da447f5a6

  • SSDEEP

    1536:ZzFbxmLPWQMOtEvwDpj386Sj/WprgJN6tZdOyJ3rFC0wl:ZVxkGOtEvwDpjcai

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-08_8a23343c8e9b8ac8a58cfbddd15103a2_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-08_8a23343c8e9b8ac8a58cfbddd15103a2_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    61KB

    MD5

    8c898379a61bcd65cd7248cf1c394e82

    SHA1

    e685bca85e23906ae1dbfdb45d1911f1ad13087b

    SHA256

    3e71701c9b7dbccac9dd4357123e856f930ef35ccd4a22e2a513c7b945c79727

    SHA512

    92a85ccc81a6588c17e0c4bbf6c05d72b21c1123dcae28556a2bdd3d83db020f4545d40ae9c5b33c7ac7453edea4b10cf7fb660117ec57888d64b4cab4abfccf

  • memory/1400-0-0x0000000000450000-0x0000000000453000-memory.dmp

    Filesize

    12KB

  • memory/1400-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1400-2-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1400-3-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/1400-17-0x0000000000450000-0x0000000000453000-memory.dmp

    Filesize

    12KB