Analysis

  • max time kernel
    156s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 23:26

General

  • Target

    2024-03-14_1ff6c606041a80e1f3a7ce9c5c3620f2_cryptolocker.exe

  • Size

    386KB

  • MD5

    1ff6c606041a80e1f3a7ce9c5c3620f2

  • SHA1

    f00045d236b8133d8661792f329f545157d81595

  • SHA256

    24b6b1cfd0dd281424f048ba2ae9fb7b840c04a101b880b289dee82517a215ae

  • SHA512

    029cd49e82ce7b4aa258623d3e8fae907ba30f982ba70d624ec3eb76d56721ceb85ac87c12e0997fe736d521a0939deb0d6454259af41bd13311d46dd59be8c5

  • SSDEEP

    6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXj:nnOflT/ZFIjBz3xjTxynGUOUhXj

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-14_1ff6c606041a80e1f3a7ce9c5c3620f2_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-14_1ff6c606041a80e1f3a7ce9c5c3620f2_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3884
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2308
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3792 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:956

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

            Filesize

            387KB

            MD5

            97c56a744a6a59d78f83f389a6f4eeb6

            SHA1

            b9eed5bd37431c49ea98e18647c39a1e2953a4d3

            SHA256

            c36b31cf5cbb0ce01994ad88372c653e00c973d36d69139037c0b420cf4bc283

            SHA512

            5c9060cef9c5ee746ef55cd0700c90ec2a32d346d660b014561a05e9afc2d0a1e3103eee27ffbcc1e04811d04180bf2bc2b58e2bbeb665324526e3ec64b158d4

          • memory/2308-17-0x0000000002D60000-0x0000000002D66000-memory.dmp

            Filesize

            24KB

          • memory/2308-18-0x0000000003010000-0x0000000003016000-memory.dmp

            Filesize

            24KB

          • memory/3884-0-0x00000000006F0000-0x00000000006F6000-memory.dmp

            Filesize

            24KB

          • memory/3884-1-0x00000000006F0000-0x00000000006F6000-memory.dmp

            Filesize

            24KB

          • memory/3884-2-0x00000000021B0000-0x00000000021B6000-memory.dmp

            Filesize

            24KB