Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/04/2024, 02:41

General

  • Target

    2024-04-05_7c8e0c1706ace23cf7ff47c31539eb3a_cryptolocker.exe

  • Size

    36KB

  • MD5

    7c8e0c1706ace23cf7ff47c31539eb3a

  • SHA1

    162536636a535e90985bf4bdddd27e0e6ead3545

  • SHA256

    7e11f7a883c6e8d2bdbf27574d4ccfa1866656bd914833af8ad08af757e0bd5f

  • SHA512

    ff8846f09a619b6c8fbc3108183e4a45ba437aad5276a23c11647e48803c25bb5a6b242909410c3453ad43f9d827d1b2d7272807354357cc37f52e778b4f7409

  • SSDEEP

    384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUgIunIVpeNs23mAA6lmRh:bA74zYcgT/Ekd0ryfjPIunqpeNswm9n

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-05_7c8e0c1706ace23cf7ff47c31539eb3a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-05_7c8e0c1706ace23cf7ff47c31539eb3a_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    36KB

    MD5

    6aaeca358cd33bdeb048d590f4f353e9

    SHA1

    4c877669b8a1964a34218c2804d2a056e3d2012f

    SHA256

    3ef9b04e714f3822bb1fb1b779b2655a1a0ff943e9dc175d014ddeb365a23afa

    SHA512

    418be18017378bc27d6dd313aaca48491770f34f0a79b7b090cd093b7e611b4fd676427f0bf41720bee828975f5cead04c6262a933185cba3e10ea2dbdefae76

  • memory/1116-0-0x0000000000730000-0x0000000000736000-memory.dmp

    Filesize

    24KB

  • memory/1116-1-0x0000000000730000-0x0000000000736000-memory.dmp

    Filesize

    24KB

  • memory/1116-2-0x0000000002500000-0x0000000002506000-memory.dmp

    Filesize

    24KB

  • memory/2072-17-0x00000000020C0000-0x00000000020C6000-memory.dmp

    Filesize

    24KB

  • memory/2072-18-0x0000000002010000-0x0000000002016000-memory.dmp

    Filesize

    24KB