Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2024, 07:23

General

  • Target

    2024-04-09_0ac90893d4ff2edf787adb7733b0b9c1_cryptolocker.exe

  • Size

    21KB

  • MD5

    0ac90893d4ff2edf787adb7733b0b9c1

  • SHA1

    a0f1ed6a3ac8b159f0d1cf53213ef1050df9dcb3

  • SHA256

    5e4427f1766a4c63591a525209b96d2b90f35eb89ae0219294e80abb5eaebdfb

  • SHA512

    07d8dc607591b07254733b149843ae8fc3f1d9d536528c8617a3d8743ad7fbe78a9b738504f26bebd66aef475a44556e463b10c8b7f574bd559d7d795b4a99a0

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp8:bVCPwFRo6CpwXFXSqQXfju

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • UPX dump on OEP (original entry point) 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-09_0ac90893d4ff2edf787adb7733b0b9c1_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-09_0ac90893d4ff2edf787adb7733b0b9c1_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:332
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    21KB

    MD5

    551314981afd26ce7545e67872a7bba4

    SHA1

    8520e0795d29c11b504cda9bb5bda0cefb63ae0d

    SHA256

    3590fa9fd00aada6648bdc4aa0ccafc105eeff3fdfb8fdfaa55f5d3b19dcfb57

    SHA512

    7d3c258b012c73e9aab78451e8c65362be32e5327d5ba35f530deddacd97d10508cb8fd7ab43e7241bbda39ab347317938eb569bb4287dd3bbd82c0cb0f23e27

  • memory/332-0-0x0000000008000000-0x000000000800E000-memory.dmp

    Filesize

    56KB

  • memory/332-1-0x0000000002160000-0x0000000002166000-memory.dmp

    Filesize

    24KB

  • memory/332-2-0x0000000002160000-0x0000000002166000-memory.dmp

    Filesize

    24KB

  • memory/332-3-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB

  • memory/332-17-0x0000000008000000-0x000000000800E000-memory.dmp

    Filesize

    56KB

  • memory/1100-19-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/1100-20-0x0000000000610000-0x0000000000616000-memory.dmp

    Filesize

    24KB

  • memory/1100-26-0x0000000008000000-0x000000000800E000-memory.dmp

    Filesize

    56KB