Analysis

  • max time kernel
    153s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 15:48

General

  • Target

    2024-03-14_b069aa2a7738e02f1aa060395174e5a3_cryptolocker.exe

  • Size

    34KB

  • MD5

    b069aa2a7738e02f1aa060395174e5a3

  • SHA1

    f1ec01b771f7c065edc6d2eb2cd706b9a81633b0

  • SHA256

    d3d446c6a765351e56342a942e110fba3c7f8a7c57277244c2a7a6241a64fea0

  • SHA512

    a567df6c45d8f90332f8a5c444275000c90d30935b646304df6603f10242dac6aae63f48b122a17fa2575405a181ce5e8a12376af3ab8f0c3a2d34223fc78c13

  • SSDEEP

    384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzl6A0MFNePXV:b/yC4GyNM01GuQMNXw2PSjH+VPXV

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-14_b069aa2a7738e02f1aa060395174e5a3_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-14_b069aa2a7738e02f1aa060395174e5a3_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:224
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      PID:2508
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3864

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\retln.exe

            Filesize

            34KB

            MD5

            15cd36409054c18997e8482f20b7dacf

            SHA1

            5e566688bc90b6754b918fb777399fab25c77a3b

            SHA256

            62743d9ba14bd9554b2f27aac02c2e58fa56db63d2e8047087b17b8c7c68501e

            SHA512

            6799a6e2a6d393e8f99f4fb6a7d1af14d5af987d0cda260490ed7653ef7d3108fe2030842373bf85511eba77902d7061c7968d2e6d893a024788f1fc813fd044

          • memory/224-0-0x0000000002250000-0x0000000002256000-memory.dmp

            Filesize

            24KB

          • memory/224-1-0x0000000002250000-0x0000000002256000-memory.dmp

            Filesize

            24KB

          • memory/224-2-0x0000000000400000-0x0000000000406000-memory.dmp

            Filesize

            24KB

          • memory/2508-24-0x0000000002120000-0x0000000002126000-memory.dmp

            Filesize

            24KB