Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2024, 18:29

General

  • Target

    2024-03-18_261d51a5d5aea1a4ef4c9bbda2aa0101_cryptolocker.exe

  • Size

    63KB

  • MD5

    261d51a5d5aea1a4ef4c9bbda2aa0101

  • SHA1

    18c899d8b9e380c14ac02b56a4a6c5659c394df0

  • SHA256

    ee77cac6b75cb04fcf5c1773e22c32c6532c3df01495d25406a59a8d7e3366fd

  • SHA512

    b3de8fd0f9b49a0d20730a2e2cbaf7fb41f77b098b3504d31b02ab0c05a9a4ae1885859081328765036c29efe01791da22074fbe911e4ee056f19eb9b7cc88b6

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5k5r3:zj+soPSMOtEvwDpj4kpmeLmQ9

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • UPX dump on OEP (original entry point) 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-18_261d51a5d5aea1a4ef4c9bbda2aa0101_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-18_261d51a5d5aea1a4ef4c9bbda2aa0101_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3604
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies system certificate store
      PID:4392

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          64KB

          MD5

          41421b27e5244094dc15ced9f368d95a

          SHA1

          a89902ef63c4a46ba947a446c194c1f6b8350c0e

          SHA256

          29b4fb75602529aba912edc8b2dab4ed255536ef8db96e8dd23422b442a351d3

          SHA512

          140802c0a5c2fd3c6160ee50f911496b9064cb43af3de557d9e6c26259a3fbe515ce23cd981e3ca36702b4da591c5d7dafeced1f7e195f1f9ee4d377fb31dbcd

        • C:\Users\Admin\AppData\Local\Temp\misids.exe

          Filesize

          315B

          MD5

          a34ac19f4afae63adc5d2f7bc970c07f

          SHA1

          a82190fc530c265aa40a045c21770d967f4767b8

          SHA256

          d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

          SHA512

          42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765

        • memory/3604-0-0x0000000000500000-0x0000000000510000-memory.dmp

          Filesize

          64KB

        • memory/3604-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/3604-2-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/3604-3-0x00000000004F0000-0x00000000004F6000-memory.dmp

          Filesize

          24KB

        • memory/3604-17-0x0000000000500000-0x0000000000510000-memory.dmp

          Filesize

          64KB

        • memory/4392-19-0x0000000000760000-0x0000000000766000-memory.dmp

          Filesize

          24KB

        • memory/4392-21-0x0000000000630000-0x0000000000636000-memory.dmp

          Filesize

          24KB

        • memory/4392-50-0x0000000000500000-0x0000000000510000-memory.dmp

          Filesize

          64KB