Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2024, 04:42

General

  • Target

    2024-03-19_77754013d63865c06df63e63b76b3fff_cryptolocker.exe

  • Size

    42KB

  • MD5

    77754013d63865c06df63e63b76b3fff

  • SHA1

    29d7319630532f026762c0b38aa7a269292d5f9f

  • SHA256

    8a518bd1ea46d20bfe0f9cee3d76c61dbc4bcd12c1d860ee1f37020b1e71ebb2

  • SHA512

    f25e4a55241ee441f80e91742d1a1d4af48d8c194a1b864fab0517bf07869441c3dbdbba617ce1f22bbfd34323fa4a058c4d7d549117a356e7e2ef8512b5e0bf

  • SSDEEP

    768:b/yC4GyNM01GuQMNXw2PSjHPbSuYlW8PA9Dy:b/pYayGig5HjS3NPA9Dy

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-19_77754013d63865c06df63e63b76b3fff_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-19_77754013d63865c06df63e63b76b3fff_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3608
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\retln.exe

    Filesize

    42KB

    MD5

    cf73ebfeb11ba388e0198aa38106d30e

    SHA1

    dd69663e164a3d9c6d7a2dc049fa8757ba92a077

    SHA256

    3ec413d4d8b4d3b70393bdacf42e9fb501266fc2c5d11b9eb1911e209b482222

    SHA512

    7a17b5603b922215bedbfb5c79d77a0536c6b55eda8a96ca4a9824aa6fff0ab4c27e014cebf2123fe11edbdf73e43258c1f2dcc1cf27a60f64bcbe11bd7bc506

  • memory/2224-20-0x0000000002D60000-0x0000000002D66000-memory.dmp

    Filesize

    24KB

  • memory/3608-0-0x00000000021E0000-0x00000000021E6000-memory.dmp

    Filesize

    24KB

  • memory/3608-1-0x00000000021E0000-0x00000000021E6000-memory.dmp

    Filesize

    24KB

  • memory/3608-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB