Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2024, 21:41

General

  • Target

    2024-03-15_cebf292c46887880283716bb8b0d46e1_cryptolocker.exe

  • Size

    39KB

  • MD5

    cebf292c46887880283716bb8b0d46e1

  • SHA1

    5951ab6c8b661b05f8be3ef173a4534745794e34

  • SHA256

    3f36703c245b64be974b8f503e2950d574bea2331a3d622706bb1b094b9c4e2e

  • SHA512

    e25c9c854476a80a21a8a05450566421f99ffe463689b3feaf59f65cb9db25c350c68aa6b6027f04d1af0659ccce90903a14bc5012a99cc9867721197e657cb0

  • SSDEEP

    768:bxNQIE0eBhkL2Fo1CCwgfjOg1tsJ6zeen7JEgx3OxGD:bxNrC7kYo1Fxf3s06gYQD

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-15_cebf292c46887880283716bb8b0d46e1_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-15_cebf292c46887880283716bb8b0d46e1_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\pissa.exe
      "C:\Users\Admin\AppData\Local\Temp\pissa.exe"
      2⤵
      • Executes dropped EXE
      PID:4776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\pissa.exe

    Filesize

    39KB

    MD5

    d306f4639210f54c4cd61955de0be05e

    SHA1

    d443ef94e6e4eef1be1d38201df6354a9475e5e4

    SHA256

    b36f6ecbcfa02b8f4aa3a4fe9871514bcefce791cb37e7b4db8f4ea859b53ebb

    SHA512

    98d8c4603975265fd2f5fa301661dbb1bcbfbdc18394ef4d53b7b3b48dca196b49c2bcf2c8d14aa58bf253c0e00e9794f535ac08948b8d6135755fdab08e3d83

  • memory/3016-0-0x0000000002260000-0x0000000002266000-memory.dmp

    Filesize

    24KB

  • memory/3016-1-0x0000000002260000-0x0000000002266000-memory.dmp

    Filesize

    24KB

  • memory/3016-2-0x0000000002310000-0x0000000002316000-memory.dmp

    Filesize

    24KB

  • memory/4776-18-0x0000000002D60000-0x0000000002D66000-memory.dmp

    Filesize

    24KB

  • memory/4776-17-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB