Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-03-2024 20:40

General

  • Target

    2024-03-25_a7656e968071489e7327ae8790283473_cryptolocker.exe

  • Size

    43KB

  • MD5

    a7656e968071489e7327ae8790283473

  • SHA1

    15400a0a729d81b322cdeeda2835c9952471637d

  • SHA256

    aa4de9e49cd5e596ed071645870bb3a516c60e33662c7e479d23a1227e3ce6b2

  • SHA512

    fcb89885f5755c45a57c8e4da0007d2b46a14734ad7cce9aa73c456990ecd535d9b1e0f3c356e4426555630d13e4e0606f9d2e372edeee22ce89ac78faa92888

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDDw3sCu5b+syQNAx:bgGYcA/53GADw8Cl/nx

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-25_a7656e968071489e7327ae8790283473_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-25_a7656e968071489e7327ae8790283473_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4908
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1444
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3208 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3668

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

      Filesize

      44KB

      MD5

      ec467903915589a74d6b39d5860728b3

      SHA1

      1f579403a7805ec7309f70a1c2c3d59123a49f09

      SHA256

      46a63c445b2e2cc609c998647b4b5e9dc7a89ac4156e39fe1aa3c86ebb371636

      SHA512

      ac5b7a4135eb8c4696abcff4861c513fab6e1f0878fb2625c488023ee131b82985ed527e69fb7cc244af600a0bdf8a186b1bfe191aeccaefff58b098f4506233

    • memory/1444-17-0x0000000002280000-0x0000000002286000-memory.dmp

      Filesize

      24KB

    • memory/1444-19-0x0000000002180000-0x0000000002186000-memory.dmp

      Filesize

      24KB

    • memory/4908-0-0x0000000002350000-0x0000000002356000-memory.dmp

      Filesize

      24KB

    • memory/4908-1-0x0000000002350000-0x0000000002356000-memory.dmp

      Filesize

      24KB

    • memory/4908-2-0x0000000003150000-0x0000000003156000-memory.dmp

      Filesize

      24KB