Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2024, 03:47

General

  • Target

    2024-03-26_812bc7706455d9e0c0807d565b528f98_cryptolocker.exe

  • Size

    46KB

  • MD5

    812bc7706455d9e0c0807d565b528f98

  • SHA1

    52e1b2dd8535a5dac173fea70848e36e2d56d749

  • SHA256

    02e84c0ed8b24fb2c7721eddb936902c1d2c5e0986afa80b13145a3054c43710

  • SHA512

    3997c12582ecc2098ceee9af9be13930ef521ae910d481b5e156236219ddaebfda752cefd88c92a6dc94be7483411834efb96b0cfa002fa46b1e1863117b51c8

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPhqlcnvP7DMEgC:6j+1NMOtEvwDpjr8hP7DM2

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Detects executables built or packed with MPress PE compressor 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-26_812bc7706455d9e0c0807d565b528f98_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-26_812bc7706455d9e0c0807d565b528f98_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3124
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2996

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          47KB

          MD5

          46e32f3913c3ed5d8edc3132d45c6bd1

          SHA1

          27bbff0ee1151df398bd97dedc4674bd3c0a5ecb

          SHA256

          2e47156470916dad51f5f4676ea90c7035c16237ab40d3bd0ef003b8ed760ede

          SHA512

          11c0b1e19cd4d2bc3362c17dc0dbd38f5b1f6baf76e996250d14f8bc275feaa9d7fa177d12c047e46f129e0c280392ac84d96019c4496c4becfdaba51282f2cb

        • memory/2996-17-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/2996-20-0x00000000006D0000-0x00000000006D6000-memory.dmp

          Filesize

          24KB

        • memory/2996-23-0x00000000006B0000-0x00000000006B6000-memory.dmp

          Filesize

          24KB

        • memory/2996-27-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/3124-0-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB

        • memory/3124-1-0x00000000006A0000-0x00000000006A6000-memory.dmp

          Filesize

          24KB

        • memory/3124-2-0x00000000006A0000-0x00000000006A6000-memory.dmp

          Filesize

          24KB

        • memory/3124-3-0x00000000006C0000-0x00000000006C6000-memory.dmp

          Filesize

          24KB

        • memory/3124-18-0x0000000000500000-0x000000000050F000-memory.dmp

          Filesize

          60KB