Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2024, 21:35

General

  • Target

    2024-04-15_a28969a1da5c67d13f6f2de850e6e8d1_cryptolocker.exe

  • Size

    389KB

  • MD5

    a28969a1da5c67d13f6f2de850e6e8d1

  • SHA1

    c9de46351da956a9d611b79ffe1d532a8f2ce14c

  • SHA256

    2c280ffb7eb4c96ef8397408003d55d719027387da8c1a866d92feb33d27ab76

  • SHA512

    d8ae11a4f3fdffec99d9183462213eb9e87c038aac4c1a57f9d269a50eae44d7f8f6633c06f35b5ae32e24a279fd7f77865ef6eccd63aabdb714751991126a74

  • SSDEEP

    6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXo:nnOflT/ZFIjBz3xjTxynGUOUhXo

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-15_a28969a1da5c67d13f6f2de850e6e8d1_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-15_a28969a1da5c67d13f6f2de850e6e8d1_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    389KB

    MD5

    c1a5e45518acc2a04517acb228333975

    SHA1

    be00a752ec9682680d78a706db9e3936a128fe18

    SHA256

    a6b9f3130e12dab85aaadb8f616190b4eb2d38e7868b1e9ca505afc1d1932bb9

    SHA512

    4648cbf6a994078574653d93bec1039595f65c0fde89bd17501e8bb31317571715786b20384d2b7f14d65feb68ef937f86f47960b634dc29a3d7ba30396d561c

  • memory/1360-17-0x0000000002020000-0x0000000002026000-memory.dmp

    Filesize

    24KB

  • memory/1360-18-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/2132-0-0x0000000002250000-0x0000000002256000-memory.dmp

    Filesize

    24KB

  • memory/2132-1-0x0000000002250000-0x0000000002256000-memory.dmp

    Filesize

    24KB

  • memory/2132-2-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB