Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-03-2024 01:33

General

  • Target

    2024-03-12_442a73fb34609c3d4b1689b87e7f4573_cryptolocker.exe

  • Size

    81KB

  • MD5

    442a73fb34609c3d4b1689b87e7f4573

  • SHA1

    cd61f6dc1ba3dcc6f8a2f270e2ea3b087a680b9f

  • SHA256

    b71104f8aec23fbb450c49f84209c7ff6dafef72a4cf0880894c8fa9605f8681

  • SHA512

    7232793a3467b2c990b008bd720892f1e23345546831593c805e4e6138adfa9e3298c12043752e265efddbe918d5e8b08161fd173a3f6e82b442e691022059ff

  • SSDEEP

    1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMMAeN:TCjsIOtEvwDpj5HE/OUHnSMb

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-12_442a73fb34609c3d4b1689b87e7f4573_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-12_442a73fb34609c3d4b1689b87e7f4573_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:3880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    81KB

    MD5

    70bfb3ca80b75048901cc7fcd6f64c04

    SHA1

    22c20f3829196a751cea70ce9b3ef6779303ca27

    SHA256

    bc41350dd5ea3a12035dc0cb13daf3f43f166e42e03aaed28c1a63baf89b1051

    SHA512

    86968b4ebb1f16f9dec695accf6af7fefc38855188dc8d8de1eac19b54e309513933df4667845100bcf6e73392ffa69c046975b48c3774170a2edfcc97e62262

  • memory/2936-0-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB

  • memory/2936-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/2936-2-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/2936-3-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/2936-18-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB

  • memory/3880-17-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB

  • memory/3880-20-0x0000000002000000-0x0000000002006000-memory.dmp

    Filesize

    24KB

  • memory/3880-23-0x0000000001FE0000-0x0000000001FE6000-memory.dmp

    Filesize

    24KB

  • memory/3880-27-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB