Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-03-2024 20:32

General

  • Target

    2024-03-11_9aae709f36f3a90891d58b279fc6fb87_cryptolocker.exe

  • Size

    120KB

  • MD5

    9aae709f36f3a90891d58b279fc6fb87

  • SHA1

    d503d5b1509a4737e63dbf6782070f1efd07c364

  • SHA256

    6372fba42feb27c2145a402d9a04cea822a3892a1b573b56ae5e3c64650c709b

  • SHA512

    6cec4bbdc7a0d1adb1b1df7e2717e8e6bc87e1c278635dcf295a99c4d3ecfff2760cd7e3b3a0c29966a97f4340c084b857f16ae585d51d1dac836af7ebb138e3

  • SSDEEP

    1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfIuBKLUSd:vCjsIOtEvwDpj5H9YvQd2+

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-11_9aae709f36f3a90891d58b279fc6fb87_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-11_9aae709f36f3a90891d58b279fc6fb87_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4092
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    120KB

    MD5

    df2570738ef0b58ae642ecca5f01c8ad

    SHA1

    4e5657cc513c7410bb7abf8f8ee0374ae69f6a96

    SHA256

    ede87ccb0288ce206a89624e096ec373c90f4354b3fe79719870efffe55da1d4

    SHA512

    636116fa324b5d62e4d9442bd1c0b544aedf59694ee02b2f919c21e9259456a9fe116579b7fd12f4462e9c8fbfa9a0f19543c748da21bdb47b9c3fbed0b027f9

  • memory/2404-17-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB

  • memory/2404-19-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/4092-0-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/4092-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/4092-2-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB