Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 19:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_58b2c836fa60295942cb88c8743060ba_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-12_58b2c836fa60295942cb88c8743060ba_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-12_58b2c836fa60295942cb88c8743060ba_cryptolocker.exe
-
Size
45KB
-
MD5
58b2c836fa60295942cb88c8743060ba
-
SHA1
3d581e7c6ed18da2c0c0bc9e880857a937f61820
-
SHA256
80d244ddc648615ede155a373bf7335b609cdc9ee2e0893f44c2bb3649a22ab7
-
SHA512
9fda14c35942aa95f559299a7070169e214b687d0b84bfd9f0e4ef81cbb80d2e6458c81bc005619b73b933111afdc677b82bf10347b860c1481ed074147d9069
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjIm8z2iaSIO/WZrEu/d+qmsUHQ1wsi:ZzFbxmLPWQMOtEvwDpj386Sj/WprqQ1Y
Malware Config
Signatures
-
Detection of CryptoLocker Variants 2 IoCs
resource yara_rule behavioral2/files/0x000400000002271f-13.dat CryptoLocker_rule2 behavioral2/memory/3592-17-0x00000000005E0000-0x00000000005E6000-memory.dmp CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2024-03-12_58b2c836fa60295942cb88c8743060ba_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3592 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4064 wrote to memory of 3592 4064 2024-03-12_58b2c836fa60295942cb88c8743060ba_cryptolocker.exe 97 PID 4064 wrote to memory of 3592 4064 2024-03-12_58b2c836fa60295942cb88c8743060ba_cryptolocker.exe 97 PID 4064 wrote to memory of 3592 4064 2024-03-12_58b2c836fa60295942cb88c8743060ba_cryptolocker.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-12_58b2c836fa60295942cb88c8743060ba_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-12_58b2c836fa60295942cb88c8743060ba_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3932 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:81⤵PID:896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD581eb5648d6f5fa0a947ccf694f09fa0b
SHA108c591fd2b002e3c0ffb10604d27d7a5aca4cd46
SHA256ac706b406598f842915d7d678efa1bdddba7fa7e5d35fc18a2522e4662642460
SHA512873c2a0f6ed3845023d7e8a596356c55d307913669744f308736f7b2c5a30056d7bc3553adf4976e8ea3b61bc173dbe4e19abb5041760f63cfb83353aa747a48