Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2024, 03:44

General

  • Target

    2024-03-15_b962c4f402c3140019a8a96ba797af0f_cryptolocker.exe

  • Size

    385KB

  • MD5

    b962c4f402c3140019a8a96ba797af0f

  • SHA1

    8b0f1ccbb999f1bd112fab02c97c6de4c5d682ee

  • SHA256

    dc665de8a1add1ee33537c31b85a0271941500ccbd30ee02b7ab8ee6f421e382

  • SHA512

    d4941c335422d595791762b47a2aa088f646066162f5e56b46e402dad9a5bf87fda51df18efa3d1163f4889d43bcbb025e468f8751def88f571fcfc630219e49

  • SSDEEP

    6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXK:nnOflT/ZFIjBz3xjTxynGUOUhXK

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-15_b962c4f402c3140019a8a96ba797af0f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-15_b962c4f402c3140019a8a96ba797af0f_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    386KB

    MD5

    f9157bc76af8afa46eef3b2f208521c1

    SHA1

    b739fb00c4a3a22ccd6cd92a917bd10416d86ef0

    SHA256

    13a0805fa1ee62b079623703a580c2361000aa4c3e2e8de55e70cf4714182bdd

    SHA512

    9f9a388c9b990a64db2e4f423d38c28a8a119234c34c1824d9201d33387406a8b4a6af0d6fe44209fe12463308fbc7b100b2a38a4c405da4c86e18cb7c53859a

  • memory/1580-17-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/1580-18-0x0000000002D60000-0x0000000002D66000-memory.dmp

    Filesize

    24KB

  • memory/2584-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/2584-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/2584-2-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB