Analysis

  • max time kernel
    92s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 03:46

General

  • Target

    2024-04-10_9286683faa90a9e9874b198144b78b0b_cryptolocker.exe

  • Size

    100KB

  • MD5

    9286683faa90a9e9874b198144b78b0b

  • SHA1

    1480d36958c6ab6eb4c370db64142c7d346cbe34

  • SHA256

    4a8888b9ce741805e9f5c0ec3b43f072cd13ec56b80ab88804506c48b5b5b2be

  • SHA512

    f294f63cb59f16be073e7a152da998f9dd5a63924b2776cf070c19db5e85603aa16d24175069e5b13a7a4c28ae354097a717c79b30091af930e0a8e5066f9a2b

  • SSDEEP

    768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZ7uyA36S7MpxRiWNa9mktJHlv/k2zR:xj+VGMOtEvwDpjubwQEIiVmkxv/PR

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Detects executables built or packed with MPress PE compressor 5 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-10_9286683faa90a9e9874b198144b78b0b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-10_9286683faa90a9e9874b198144b78b0b_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:3032

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          100KB

          MD5

          6dc6dd1fa15130e109c7baedf5e08f77

          SHA1

          cf282c0a3ca031aa583b1cd46dcb1affb6043175

          SHA256

          14e5ab3f52c74582f1e60a0f0ef6bd012fc95f63d340577781dc3418e4df84a1

          SHA512

          66d5fdf10bc53e0275c00f4f2b99a803e8362fa5c6c9a25af6a34a8d8f39367e6a96c70e305fbf10e467b286cb77ef6bb699902a577b720d551307cf1dcd963c

        • C:\Users\Admin\AppData\Local\Temp\misids.exe

          Filesize

          1KB

          MD5

          1316f214df3f2651af58dfa07ba01891

          SHA1

          37fa8f4121a64f8e23e3859967fba233f7786a5c

          SHA256

          f5b5dfceb1eb19ef78efb7e25192be9c25ab07ed0330a1dc61a12fa04c6e182f

          SHA512

          e9e15f2c8ada607d7939864341a23378399478f1156ebebf4ba561eef979eaf922a53730a28aa97c51dcdf8f19ab60c3a8e9f7036c5cc2629526db15c8fa80ed

        • memory/3008-0-0x0000000000500000-0x0000000000510000-memory.dmp

          Filesize

          64KB

        • memory/3008-1-0x0000000000670000-0x0000000000676000-memory.dmp

          Filesize

          24KB

        • memory/3008-2-0x0000000000670000-0x0000000000676000-memory.dmp

          Filesize

          24KB

        • memory/3008-3-0x0000000002240000-0x0000000002246000-memory.dmp

          Filesize

          24KB

        • memory/3008-17-0x0000000000500000-0x0000000000510000-memory.dmp

          Filesize

          64KB

        • memory/3032-18-0x0000000000500000-0x0000000000510000-memory.dmp

          Filesize

          64KB

        • memory/3032-22-0x00000000020E0000-0x00000000020E6000-memory.dmp

          Filesize

          24KB

        • memory/3032-20-0x0000000002100000-0x0000000002106000-memory.dmp

          Filesize

          24KB

        • memory/3032-62-0x0000000000500000-0x0000000000510000-memory.dmp

          Filesize

          64KB