Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-03-2024 05:31

General

  • Target

    2024-03-13_229d8cc8a214be9d579609ab90b06e6d_cryptolocker.exe

  • Size

    127KB

  • MD5

    229d8cc8a214be9d579609ab90b06e6d

  • SHA1

    8f5b839b8909f8ebe344e44cef3eda0854c49829

  • SHA256

    387ffb3545f2ae7e13149bb50177bf1b688b7ded245b595a4e62bb45b8913ef2

  • SHA512

    a248c461ff41ee03dae31710c7759a207f1a39339e0abbabd360460fa61210f8921a9e9b5c59a7854bfc10967467eed8e1a496dd87ee8ef648d9cfd53e7c9811

  • SSDEEP

    1536:gUj+AIMOtEvwDpjNbwQEIPlemUhYwkkxGBp3U:vCA9OtEvwDpjo

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-13_229d8cc8a214be9d579609ab90b06e6d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-13_229d8cc8a214be9d579609ab90b06e6d_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3520
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:5048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    127KB

    MD5

    127eae4432206bcc6ce0f91ed6420017

    SHA1

    789ad182626570979065b2fc29766e0e24140315

    SHA256

    aa99d95bd70853ffe05b8eeff281d00ec6a4f766eabfdd4de641eae6f9cba212

    SHA512

    323f66a149e1378767bd376f95d528a82cfe34b9cca1d421d9651d25e60e1e231455254df9df7f81287c2af7bac1e8a0b3dd4936fac4c517351a4c1a57efbd64

  • memory/3520-0-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB

  • memory/3520-1-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB

  • memory/3520-2-0x0000000000600000-0x0000000000606000-memory.dmp

    Filesize

    24KB

  • memory/5048-18-0x00000000005F0000-0x00000000005F6000-memory.dmp

    Filesize

    24KB

  • memory/5048-17-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB