Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2024, 00:46

General

  • Target

    2024-03-19_36195f3e680bd4c5b4cb50de6dc9614c_cryptolocker.exe

  • Size

    49KB

  • MD5

    36195f3e680bd4c5b4cb50de6dc9614c

  • SHA1

    8bbdfc800689e22f4c5c290d83cb8c906776cccc

  • SHA256

    a66da165eb804d142a6ccf1043010b7bc8cc14c616ce1b778a4abef529d01281

  • SHA512

    d99600b841f9c8dcbb99f8348c408cacc2f5d0bb3719f1b2ff2fba2186a9e1cd1cbba286bb224ecf13b0b0b7a6012ea8efecece2b04065ee8c20c7de04ba7976

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37YbDu5z/hQcEp7B9:bgGYcA/53GAA6y37nbQb9

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-19_36195f3e680bd4c5b4cb50de6dc9614c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-19_36195f3e680bd4c5b4cb50de6dc9614c_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:3992

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          49KB

          MD5

          cbed2dbf83025b42920b8c1a97eb3340

          SHA1

          9338f535f005b3b2f53ede47c1ccdd8340dec5cc

          SHA256

          29ca318b8384f9007c00096fefc0e5a2ed6e0c8aa3c2065e5da0ce5a9dd2bc40

          SHA512

          0deb376312ff137cd12d9170b52b9a5eb7d4854a0652a9cdde8ba3a3fe20cf3760fbba0329ec37aaeab7d56c0efa0ea28c756dc5ebe602b60faceab3ba0d5ac2

        • memory/2252-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

          Filesize

          24KB

        • memory/2252-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

          Filesize

          24KB

        • memory/2252-2-0x0000000003150000-0x0000000003156000-memory.dmp

          Filesize

          24KB

        • memory/3992-19-0x0000000000600000-0x0000000000606000-memory.dmp

          Filesize

          24KB

        • memory/3992-17-0x0000000002090000-0x0000000002096000-memory.dmp

          Filesize

          24KB