Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 20:27

General

  • Target

    2024-03-14_4800c966f73d323198a156b7142a3027_cryptolocker.exe

  • Size

    60KB

  • MD5

    4800c966f73d323198a156b7142a3027

  • SHA1

    292fdbfbd028c1d59105ff129e9af1e9c23c7493

  • SHA256

    107081945d1a763fadd027b72d67e1e27b59c9bf0e27c77f59e0a28d5ff2e183

  • SHA512

    238186a71468e63e1776b8468b45c53fc50d11be6041223259a730c52578899f882e205ff24b225bc685872170f56dde644a9ab45a90ffc5dd75ceb65bcb880a

  • SSDEEP

    768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjIm8lB4dCOBy/cMFqeoYPO+lxUUeq:ZzFbxmLPWQMOtEvwDpj38lD/cMAT+lIq

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-14_4800c966f73d323198a156b7142a3027_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-14_4800c966f73d323198a156b7142a3027_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5032
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    61KB

    MD5

    fddfb98b4e7b136061eafb45b19b0a7b

    SHA1

    d00a3203ee18f1e762d2f72e88b4fe91e1eae90a

    SHA256

    e227e9f9001fdb0056971f14304c75e61e5049312a18ce274cabc94a81c0a36b

    SHA512

    2005ae6089cb2a27d8a57c2de0caab8397fad0cc72aa20031f13e1d2be8850b05e6f71ec0ba09ed197d3d3d64f9c27e13deebc86ffc7588d47d7078e32544345

  • memory/2004-17-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/2004-20-0x0000000001FD0000-0x0000000001FD6000-memory.dmp

    Filesize

    24KB

  • memory/2004-19-0x0000000002100000-0x0000000002106000-memory.dmp

    Filesize

    24KB

  • memory/2004-26-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/5032-1-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/5032-2-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/5032-3-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB