Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-03-2024 19:56

General

  • Target

    2024-03-19_ce12d12847e2e4429e59b590fdf51535_cryptolocker.exe

  • Size

    36KB

  • MD5

    ce12d12847e2e4429e59b590fdf51535

  • SHA1

    2d89edeed9fed719661acdf5bf7ceed1694716e3

  • SHA256

    fad781b757e44b0def0b93af0e5efbc5af44c485bfe35b6024d197f55485a39d

  • SHA512

    eabcc504d0100743156acad4c1b24fed9f6a1b793320ba6138ea3911cdead0f4ca613623414104dddb9bf134c579259530996e863d83d53a585de6bf472870d3

  • SSDEEP

    768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4/UkRYzMAAI:vj+jsMQMOtEvwDpj5HcSYPH

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-19_ce12d12847e2e4429e59b590fdf51535_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-19_ce12d12847e2e4429e59b590fdf51535_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3548
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:2032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    36KB

    MD5

    c5254e810fd777f5aa8e3c198a4bce28

    SHA1

    1edfcb2298fcbca18a5ef5091321890f31fdb0ce

    SHA256

    1037bb1031aecb16215a5cd6d3dd67d12c1b96bb792f731ace8eeeb7aa57ac59

    SHA512

    29b4afafb409476d9ad8c8915030a11a6f4602b1272452beee452121657c493f34a7b72cc44bb71e15e6ed5fa6f2de1f4f16e551e37b9f2cfa842c12583dfecf

  • memory/2032-17-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/2032-18-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3548-0-0x00000000006B0000-0x00000000006B6000-memory.dmp

    Filesize

    24KB

  • memory/3548-1-0x00000000006B0000-0x00000000006B6000-memory.dmp

    Filesize

    24KB

  • memory/3548-2-0x00000000006E0000-0x00000000006E6000-memory.dmp

    Filesize

    24KB