Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2024, 23:26

General

  • Target

    2024-03-27_6e72379dfbdd47672396bcfd2120814b_cryptolocker.exe

  • Size

    58KB

  • MD5

    6e72379dfbdd47672396bcfd2120814b

  • SHA1

    05778584358e779d7b4742c9d620e0c9c55509ce

  • SHA256

    c2d487c89639340dcd60e4b3532701c42aa1476dff58861e5a079d76485e6275

  • SHA512

    b4f5831ee36745459c96a9e2ed25e024d87d45540ee8a62099ef705688a36647360289e0178e15537f51ef4f5a6700b6942a0aa643a788e515d41c50a33a97f9

  • SSDEEP

    768:3Uz7yVEhs9+Hs1SQtOOtEvwDpjO9+4hdCY8EQMjpi/Wpi3B3URiLqCyLuAx8XGK:3P+HsMQMOtEvwDpjoHy7B3g9CWuAxW9

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-27_6e72379dfbdd47672396bcfd2120814b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-27_6e72379dfbdd47672396bcfd2120814b_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4772
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:3956

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          59KB

          MD5

          fe7a90f21c0c9d102565a0de739b3ef8

          SHA1

          274b7edb5d724c3e67bb94da851dbd5654e6cf26

          SHA256

          07cdf2a9d464753c09efdfd774dfe368d19c601392b47683c7f63b4f82542113

          SHA512

          7482706c484c4f3069975e229af5298404a64ceeb6673f8ea6195fe695d7ba670d2cd481b9f1c0d7527c9b7940c9f45dbfc1dd8fc26c9460645d3926184a8f2d

        • memory/3956-19-0x0000000002100000-0x0000000002106000-memory.dmp

          Filesize

          24KB

        • memory/3956-23-0x00000000021E0000-0x00000000021E6000-memory.dmp

          Filesize

          24KB

        • memory/3956-26-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB

        • memory/4772-0-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB

        • memory/4772-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/4772-2-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/4772-3-0x00000000004F0000-0x00000000004F6000-memory.dmp

          Filesize

          24KB

        • memory/4772-17-0x0000000000500000-0x000000000050B000-memory.dmp

          Filesize

          44KB