Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/03/2024, 12:42

General

  • Target

    2024-03-10_53c1b356aaf75c56ef4e7925b2a96029_cryptolocker.exe

  • Size

    36KB

  • MD5

    53c1b356aaf75c56ef4e7925b2a96029

  • SHA1

    a2d268b11642f13b0b5498bdb15621625fb44d6f

  • SHA256

    5d58d90f4ed636d35574ecc6879c18079df9776683a29a12464671f1a39c78b4

  • SHA512

    ee71b00f4dca8087f9d8fc663fc9d0d98be0f52784ad60ae693afe302f36a01074b8b31b1eb99bb3cdc7ee208f75fc35ee76fc239fc85ee89e7d9f8ba6586f52

  • SSDEEP

    768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4/UkRYzMAZ+bc:vj+jsMQMOtEvwDpj5HcSYPj

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-10_53c1b356aaf75c56ef4e7925b2a96029_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-10_53c1b356aaf75c56ef4e7925b2a96029_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:936
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:384
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:4360
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2184

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\misid.exe

      Filesize

      36KB

      MD5

      6f7c6dffaa8d3569d19cb822345aebcc

      SHA1

      c6dd2d3f61408178636cdd77f3a030827846c180

      SHA256

      05733caa9106b39ac0f55f579fc7ebab037c223043a0c66c4ed29de4d3a7436a

      SHA512

      2ca978160979474d25480daa6fe86a9b2e3adc6d2948e15b82983073bc95c2d715517d9f22affb4b380d58cb17e36cddc3ffd08e95e970c98d73fa32994dcf18

    • memory/384-18-0x00000000020C0000-0x00000000020C6000-memory.dmp

      Filesize

      24KB

    • memory/384-17-0x00000000020E0000-0x00000000020E6000-memory.dmp

      Filesize

      24KB

    • memory/936-0-0x0000000000660000-0x0000000000666000-memory.dmp

      Filesize

      24KB

    • memory/936-2-0x0000000000690000-0x0000000000696000-memory.dmp

      Filesize

      24KB

    • memory/936-1-0x0000000000660000-0x0000000000666000-memory.dmp

      Filesize

      24KB

    • memory/2184-24-0x0000012E0E140000-0x0000012E0E150000-memory.dmp

      Filesize

      64KB

    • memory/2184-40-0x0000012E0E240000-0x0000012E0E250000-memory.dmp

      Filesize

      64KB

    • memory/2184-56-0x0000012E16540000-0x0000012E16541000-memory.dmp

      Filesize

      4KB

    • memory/2184-58-0x0000012E16560000-0x0000012E16561000-memory.dmp

      Filesize

      4KB

    • memory/2184-59-0x0000012E16560000-0x0000012E16561000-memory.dmp

      Filesize

      4KB

    • memory/2184-60-0x0000012E16680000-0x0000012E16681000-memory.dmp

      Filesize

      4KB