Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/03/2024, 17:09

General

  • Target

    2024-03-29_ad7fb5d05be7e8a37c9a60f0dfc7b736_cryptolocker.exe

  • Size

    102KB

  • MD5

    ad7fb5d05be7e8a37c9a60f0dfc7b736

  • SHA1

    aa7af6d3d02a16dfad146f8a29c3fa34460e9162

  • SHA256

    2a56cc04f6f9d394002766a1800dd28103807f652fdb606a96d7e32084b1e7ac

  • SHA512

    597e908702e8ffbf356c6eb34ee26ba37c94fa0f3443921eec888890d5d77f0271f4a24fd834ea59e582484f569a8c1542b44d2c48fe7a0cdbd401fac386f6dc

  • SSDEEP

    768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZ7uyA36S7MpxRiWNa9mktJHlv/k2wSd8:xj+VGMOtEvwDpjubwQEIiVmkxv/A

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Detects executables built or packed with MPress PE compressor 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-29_ad7fb5d05be7e8a37c9a60f0dfc7b736_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-29_ad7fb5d05be7e8a37c9a60f0dfc7b736_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    102KB

    MD5

    000f12902536ac4a039251b25e4fb6be

    SHA1

    5b3fff0dd3b95e66edec39f4713f2c1baa357876

    SHA256

    a6758babe8518f8c2f0874ea6c9552733933fc43dab44a4fe35e88f4eabf8c13

    SHA512

    0ace345f165ef9af63a118c9765b84a4088c8fe7d2765fcd366c22b3a2a9eb754f86d2ef1351277de1782616544541698e04035815b41cb58240b41955c000e9

  • C:\Users\Admin\AppData\Local\Temp\misids.exe

    Filesize

    315B

    MD5

    a34ac19f4afae63adc5d2f7bc970c07f

    SHA1

    a82190fc530c265aa40a045c21770d967f4767b8

    SHA256

    d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

    SHA512

    42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765

  • memory/1048-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1048-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1048-2-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1048-3-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/1048-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2744-47-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB