Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-04-2024 19:47

General

  • Target

    2024-04-05_34b35e2361cd0f425d5286defa3b546d_cryptolocker.exe

  • Size

    49KB

  • MD5

    34b35e2361cd0f425d5286defa3b546d

  • SHA1

    65183b71c85706b6dc8e6aead039d2654daa6ec7

  • SHA256

    712dd0396070159c9c23e4af3a58967ae3a3286c8505c6c22a174189d0a27dba

  • SHA512

    4e7c317cf6c78c5daf29a7cbd675d5c2f9ba6d00622a952ecbfc0920926d44341a809291fb839435041524c9198bacfd86939ac6c9b93f97c5c6e4625f7d8eae

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37YbDu5z/hvvkug:bgGYcA/53GAA6y37nbrg

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-05_34b35e2361cd0f425d5286defa3b546d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-05_34b35e2361cd0f425d5286defa3b546d_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3088
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    49KB

    MD5

    867d8766ba772a037c6a381478c12984

    SHA1

    cf7269e7d9a7fbc49adbb307e362db281b467ede

    SHA256

    384b8774b17a489f2be12520b1f700c2e3ae8ce1ae2704c9aea22528581e85d3

    SHA512

    ee35ed9caf3cb170738b02239db20a06ae9a7e9345baa8d22c10e29077b76f70bfe60e7626b496cd8c264d29b53060ed8ec23e0b8bdce9a96012d72baa827361

  • memory/808-17-0x0000000002050000-0x0000000002056000-memory.dmp

    Filesize

    24KB

  • memory/808-22-0x0000000001F90000-0x0000000001F96000-memory.dmp

    Filesize

    24KB

  • memory/3088-0-0x0000000002240000-0x0000000002246000-memory.dmp

    Filesize

    24KB

  • memory/3088-1-0x0000000002240000-0x0000000002246000-memory.dmp

    Filesize

    24KB

  • memory/3088-2-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB