Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-03-2024 10:51

General

  • Target

    2024-03-15_e717558b57b7987d70dc01b31f6dee8d_cryptolocker.exe

  • Size

    65KB

  • MD5

    e717558b57b7987d70dc01b31f6dee8d

  • SHA1

    184a8aba7d56f1e750dedfee09bc75e402f9499f

  • SHA256

    11c635677f6c818c801a5e5ad0cbcacac47a1ab4e6a3cc1c85ecdea2b389dd37

  • SHA512

    89b5ebc293c21a3cac44dff58003a96c2006ed162e21c8f1cc0e95e6d9183ae183b88fe9329ed7589873e7dc364336bded156a687fc255e218a16b73cfc1f930

  • SSDEEP

    1536:ZzFbxmLPWQMOtEvwDpj386Sj/WprgJN6tZdOyJ3hvLcbV+:ZVxkGOtEvwDpjcawY

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-15_e717558b57b7987d70dc01b31f6dee8d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-15_e717558b57b7987d70dc01b31f6dee8d_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    65KB

    MD5

    6080b285e7246f677bd4d07bcb414abd

    SHA1

    5d2a22039673e85f79a52b54a8c36e333b96ba8d

    SHA256

    87360203be480395dee3093f201f1cde88c150f7a6356ae83320355207507afa

    SHA512

    2c05f0b489dd2f55506b405c55e3a805305cab5445130077a3e9d84f8919289491149e9518aaac83272df76976b7616cde10839f07f819dfc239d891ebb601fb

  • memory/864-0-0x00000000004E0000-0x00000000004E3000-memory.dmp

    Filesize

    12KB

  • memory/864-1-0x00000000007B0000-0x00000000007B6000-memory.dmp

    Filesize

    24KB

  • memory/864-2-0x00000000007B0000-0x00000000007B6000-memory.dmp

    Filesize

    24KB

  • memory/864-3-0x0000000002230000-0x0000000002236000-memory.dmp

    Filesize

    24KB

  • memory/864-17-0x00000000004E0000-0x00000000004E3000-memory.dmp

    Filesize

    12KB

  • memory/3020-19-0x0000000000450000-0x0000000000490000-memory.dmp

    Filesize

    256KB

  • memory/3020-20-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/3020-21-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3020-27-0x0000000000450000-0x0000000000490000-memory.dmp

    Filesize

    256KB