Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-03-2024 07:40

General

  • Target

    2024-03-14_6a3f9f65186107c01d82e78ffddcffd6_cryptolocker.exe

  • Size

    42KB

  • MD5

    6a3f9f65186107c01d82e78ffddcffd6

  • SHA1

    16321875d8b572eb2147f375d20ed4475b27c9ca

  • SHA256

    af974a9fdf3b2dbedb1e69feb9c671a11d686e68ea4ab474cda91392a512fbf6

  • SHA512

    8cb26c07b0b11d36f74dd0199b86ddd0814458e0b646fda257152881b6c227cb8d390b89250d292076df4dffd792937bea9508262f5434d49c06a2b9d7d6f871

  • SSDEEP

    768:b/yC4GyNM01GuQMNXw2PSjHPbSuYlW8PA9Dx:b/pYayGig5HjS3NPA9Dx

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-14_6a3f9f65186107c01d82e78ffddcffd6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-14_6a3f9f65186107c01d82e78ffddcffd6_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3324
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      PID:2624
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3240 --field-trial-handle=2588,i,4353937220825226770,7138584070663735671,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3880

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\retln.exe

      Filesize

      42KB

      MD5

      7c52a4b087d5d281887e71f466911190

      SHA1

      5a0d1966cf5d419a90ca6ef8585c1291e9423d90

      SHA256

      3a36c02826a53ac96e08bd76ae2ac278f8db51f4e09ccb2193e92f6dae2a10ba

      SHA512

      04a9ecc625c43b15ed487ab54472554f2b24a2d8b0d6b1fab7c65c138206b847fe4e3f4987f6071d57d52b06d3510d330b3b18544fe01736219f78947f9ff90d

    • memory/2624-20-0x0000000002D60000-0x0000000002D66000-memory.dmp

      Filesize

      24KB

    • memory/3324-0-0x0000000002350000-0x0000000002356000-memory.dmp

      Filesize

      24KB

    • memory/3324-1-0x0000000002350000-0x0000000002356000-memory.dmp

      Filesize

      24KB

    • memory/3324-2-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB