Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 11:27

General

  • Target

    2024-04-10_203c8fd1370cebf58850f215cefc4ccc_cryptolocker.exe

  • Size

    40KB

  • MD5

    203c8fd1370cebf58850f215cefc4ccc

  • SHA1

    1058349770ff198dd79187abab55605c3acf901b

  • SHA256

    36d633e781a43f8db66eb67fd2761d431df68aede86fc28a44f861760358feca

  • SHA512

    af3f30ff54ffc101c0166aca1408f46b762fbd59a82b1823afcc5cc1a161a7f3427e0ccf324fcaafe84c5587fdea1c72ed1ecf4d94414e7b9b38161a7745ee69

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDDw3sCu5mXW1Rb:bgGYcA/53GADw8C3qd

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-10_203c8fd1370cebf58850f215cefc4ccc_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-10_203c8fd1370cebf58850f215cefc4ccc_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4664
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1520

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          40KB

          MD5

          0365b2560cf1ed2e8416303e59105f45

          SHA1

          c5a605145ff854dc6ae04fb4d7e4560b618f43a9

          SHA256

          833bf88eb93ee782752545cdbca7b50899953562a141ddeeeece893ca4ecb816

          SHA512

          84b4119951b91af15bf1060abff5abf50ae46b2933b2f162a7db0140fa3bb597ea18bf2e9a4854a438d3378c91c838e9e3eb83fa5543902852fbd87715463d91

        • memory/1520-17-0x0000000002270000-0x0000000002276000-memory.dmp

          Filesize

          24KB

        • memory/1520-20-0x0000000002200000-0x0000000002206000-memory.dmp

          Filesize

          24KB

        • memory/4664-0-0x0000000000510000-0x0000000000516000-memory.dmp

          Filesize

          24KB

        • memory/4664-1-0x0000000000510000-0x0000000000516000-memory.dmp

          Filesize

          24KB

        • memory/4664-2-0x0000000002180000-0x0000000002186000-memory.dmp

          Filesize

          24KB