Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-03-2024 13:49

General

  • Target

    2024-03-15_86e34f98aea29bd142b5660c5c288de0_cryptolocker.exe

  • Size

    385KB

  • MD5

    86e34f98aea29bd142b5660c5c288de0

  • SHA1

    0ba95e86bcac4bb0448b0a5c52e5d2959ceffff6

  • SHA256

    b4522c235424f4fc44c2bca2a10b6d973770f613e528fbf094896f3871bd41f3

  • SHA512

    76a3516d43bdda528dfd224840691b114d3603766c33e9f75520a81158e8cd8fe66dbb78091cfb753bf87301b2ea9e7cffac67f6f2546c8c290fa3358380716f

  • SSDEEP

    6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXR:nnOflT/ZFIjBz3xjTxynGUOUhXR

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-15_86e34f98aea29bd142b5660c5c288de0_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-15_86e34f98aea29bd142b5660c5c288de0_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4240
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    386KB

    MD5

    f600aa985b9761f39fc218b9acd0d613

    SHA1

    f4909a4e5c7b584ce98124fbbca2442274a5c8dc

    SHA256

    469528ef64e23cb2197aff7001bcbe1179ee27442922fcc67527ba72080ab7e0

    SHA512

    f8588afa7778d8abd8c39f27fcfc63cabc432586b21909c4c07847f91acbadab64e09d72f0379f6f6d4c602f2eac061424f5806d5c2cb2a4ccc4a67e693da307

  • memory/1764-17-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/1764-19-0x0000000002D60000-0x0000000002D66000-memory.dmp

    Filesize

    24KB

  • memory/4240-0-0x0000000002340000-0x0000000002346000-memory.dmp

    Filesize

    24KB

  • memory/4240-1-0x0000000002340000-0x0000000002346000-memory.dmp

    Filesize

    24KB

  • memory/4240-2-0x0000000002400000-0x0000000002406000-memory.dmp

    Filesize

    24KB