Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-03-2024 20:35

General

  • Target

    2024-03-12_9e8502d6e904dc39695e3b2312b5564f_cryptolocker.exe

  • Size

    34KB

  • MD5

    9e8502d6e904dc39695e3b2312b5564f

  • SHA1

    3275ad8236e76bbaab2d2a20055ef1c43758f131

  • SHA256

    7e89cf814a0beeef26c13c99b5559eeb05f70d0aeda5dd761a01a56f9945c4a5

  • SHA512

    b8d0f11db73448489a63ca38e246e6f2e1e3a8644817d762566199d20e7eb746e39fde3c75b2b2ee43e3880decc1127115562c2ab69efd60138bfdb0f68471ed

  • SSDEEP

    384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUgIunexRlSrxV1P8:bA74zYcgT/Ekd0ryfjPIunYwfP8

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-12_9e8502d6e904dc39695e3b2312b5564f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-12_9e8502d6e904dc39695e3b2312b5564f_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3148
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    35KB

    MD5

    f9a4873d1313d7b682ca5a1a68123eb7

    SHA1

    1cb4106fb37ba3f0550bfa8044d0075e7c173397

    SHA256

    4232cb5a37427632e96c4b06e5c5fe81e04e497236242816089ba51e94ae9a15

    SHA512

    29a365f287b5a55cd66488f4af4fad4d3e1f7504285f6398905480a9f11e26043671d483fd040bd659c4123d41754b0f257b18da71f02a0ab4d1935a671a9ddd

  • memory/1480-19-0x0000000002D50000-0x0000000002D56000-memory.dmp

    Filesize

    24KB

  • memory/3148-0-0x0000000002180000-0x0000000002186000-memory.dmp

    Filesize

    24KB

  • memory/3148-1-0x0000000002180000-0x0000000002186000-memory.dmp

    Filesize

    24KB

  • memory/3148-2-0x0000000003000000-0x0000000003006000-memory.dmp

    Filesize

    24KB