Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-03-2024 10:29

General

  • Target

    2024-03-10_3161e23a1c465e12253f55145779f03e_cryptolocker.exe

  • Size

    59KB

  • MD5

    3161e23a1c465e12253f55145779f03e

  • SHA1

    ea2be9133b7809a687731716e0f775f2cf21cf97

  • SHA256

    1557541d54a9cf5ced3f1b8feb554e8f5c75adf2e9e5dd5542ffc35486735aed

  • SHA512

    3faa8fc872fc9fac10264fe2d7d798c74f5394778944859b45eef33fc28d695111b40cc1ad8a85fd28d4449bd8e8f0b360e00bd18ca8254112fa5b5f34b324d1

  • SSDEEP

    1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMB:TCjsIOtEvwDpj5HE/OUHnSMC

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-10_3161e23a1c465e12253f55145779f03e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-10_3161e23a1c465e12253f55145779f03e_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:3584
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4432

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\misid.exe

      Filesize

      60KB

      MD5

      bd7a9eb3b55de87c51d864f98a2cf983

      SHA1

      3bd112cd6e480df0e3c2811cd815041def70b2b3

      SHA256

      0f8d71732c94975883b893f9548e8d5d75466662353537b3d5d517e0a8cfb86a

      SHA512

      ac572a15cbd0c511a2b7e5236b7867f035e3a6384414eef705fe8004a2f7d9f6a9c3a83e6974fcbf92b7d73c8030517ddbc06480728b94924d0fb26f53872343

    • memory/2364-0-0x0000000000500000-0x000000000050E000-memory.dmp

      Filesize

      56KB

    • memory/2364-1-0x00000000004E0000-0x00000000004E6000-memory.dmp

      Filesize

      24KB

    • memory/2364-2-0x00000000004E0000-0x00000000004E6000-memory.dmp

      Filesize

      24KB

    • memory/2364-3-0x0000000000660000-0x0000000000666000-memory.dmp

      Filesize

      24KB

    • memory/2364-25-0x0000000000500000-0x000000000050E000-memory.dmp

      Filesize

      56KB

    • memory/3584-18-0x00000000021D0000-0x00000000021D6000-memory.dmp

      Filesize

      24KB

    • memory/3584-19-0x0000000002070000-0x0000000002076000-memory.dmp

      Filesize

      24KB

    • memory/3584-26-0x0000000000500000-0x000000000050E000-memory.dmp

      Filesize

      56KB