Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 02:58

General

  • Target

    2024-04-10_c9b48c912347ee7180e3eb90920c832d_cryptolocker.exe

  • Size

    61KB

  • MD5

    c9b48c912347ee7180e3eb90920c832d

  • SHA1

    5ec3c16f448276a4818aab6f808717e111cb65f2

  • SHA256

    0a881ca39859c822a7d573ee06cf3d3b9d731bf27861a6c50531427c7eeb99ec

  • SHA512

    d941d575e0728fb9979707bb98a2f7505d6da8f4449ae8e72df73ee8a73ec072ca773b9309945a2714c4ae82cf0bac7356478a07235f9f7434176593ce90c904

  • SSDEEP

    1536:ZzFbxmLPWQMOtEvwDpj386Sj/WprgJN6tZdOyJT/EZjy:ZVxkGOtEvwDpjcOH

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-10_c9b48c912347ee7180e3eb90920c832d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-10_c9b48c912347ee7180e3eb90920c832d_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:4008
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4440

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\misid.exe

            Filesize

            61KB

            MD5

            fac60c20237edf0afccb05a1ada1a592

            SHA1

            1caa4472236ed142f7538c522357cb58e134de76

            SHA256

            38deb0c4c085372adc893610d3a0e126a501dd2bcb48ed437614beb1e9c3d732

            SHA512

            b41a0b7fadedb87b089f4aab22b94a78b0a398c00122428f0fca5dcfbc26ed6e55145978a102981b607ac5773e72f940ca64bacdca597d30607d408bbd5c0598

          • C:\Users\Admin\AppData\Local\Temp\misids.exe

            Filesize

            1KB

            MD5

            5e7fe1659a215e33b7aa26057f6f55d5

            SHA1

            6de1d4cce23659c5172f8ec1bf85ac64dacd8d43

            SHA256

            00496e61bac6b05f57253f53070c5ba5bc50c6703fe48a4a9fea8c16136bae34

            SHA512

            1a8f47f9a39a0bb4bec403388f2c512fdd8fa4838a94523163938a8f52e428e5a6e2cc2725b137f64d7074ea60c27a9c734d25adcf6f66db990750193687dc93

          • memory/2596-0-0x00000000004E0000-0x00000000004E3000-memory.dmp

            Filesize

            12KB

          • memory/2596-1-0x00000000005E0000-0x00000000005E6000-memory.dmp

            Filesize

            24KB

          • memory/2596-2-0x00000000005E0000-0x00000000005E6000-memory.dmp

            Filesize

            24KB

          • memory/2596-3-0x0000000000600000-0x0000000000606000-memory.dmp

            Filesize

            24KB

          • memory/2596-22-0x00000000004E0000-0x00000000004E3000-memory.dmp

            Filesize

            12KB

          • memory/4008-17-0x00000000004F0000-0x00000000004F3000-memory.dmp

            Filesize

            12KB

          • memory/4008-19-0x00000000020F0000-0x00000000020F6000-memory.dmp

            Filesize

            24KB

          • memory/4008-21-0x00000000020D0000-0x00000000020D6000-memory.dmp

            Filesize

            24KB