Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 04:28

General

  • Target

    2024-03-11_49e2381907de5a8a86c5b6b8a157527a_cryptolocker.exe

  • Size

    38KB

  • MD5

    49e2381907de5a8a86c5b6b8a157527a

  • SHA1

    1c08198d48380f71d91baa8cc7d68ffaaca078f2

  • SHA256

    e31c4ad4afc16b05e040c291d402b2121f9fb66fa8cf5bf983b8d6633f72104e

  • SHA512

    9e969f8f340f42a8c4b56158a94437408125261a4faa1128bfa4e351d42acb4ffd5d24a84a479bba299ced87da14b694f348c2417678e36a183a396b2764898f

  • SSDEEP

    384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzl6AJvDSuYlWnM:b/yC4GyNM01GuQMNXw2PSjHPbSuYlWM

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-11_49e2381907de5a8a86c5b6b8a157527a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-11_49e2381907de5a8a86c5b6b8a157527a_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      PID:5116

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\retln.exe

          Filesize

          38KB

          MD5

          3124996ee87584a6a00c1a21957122a6

          SHA1

          c0c0689f5b6785497fc36afdee33569befb73431

          SHA256

          e4c5e2df98c5fddf7935f0fc45413f98ac35e86522aa8fc8919571602a195cab

          SHA512

          41b8998712f91f00bb59c0a3658a1fb9115f9988ba0ba4ffa9162a3892142c4480bf15e2679ee175cbe0948eeaf45ffa3770544c284dbaaab71f3827648ee88f

        • memory/2640-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

          Filesize

          24KB

        • memory/2640-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

          Filesize

          24KB

        • memory/2640-2-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/5116-21-0x0000000001FA0000-0x0000000001FA6000-memory.dmp

          Filesize

          24KB