Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2024 14:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-15_3720cf57d16e0c2409d49ee40f21c545_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-15_3720cf57d16e0c2409d49ee40f21c545_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-15_3720cf57d16e0c2409d49ee40f21c545_cryptolocker.exe
-
Size
45KB
-
MD5
3720cf57d16e0c2409d49ee40f21c545
-
SHA1
a63a9bb86e13c93a9425d06fd6ea1057675095b6
-
SHA256
6484dfbc33104b13044eae024a4c9f56a308fce620c5c31afa8354a32f8a85aa
-
SHA512
75b3a881f1377f19c822136f4a3bac97235203a6f66c7c7f162eac44a4696f36c950a2907b1211fedefb3a75745b1737cb7de4a77d1362c2417b68f206dbf8b2
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4/Uth8igNrr46xdUUuj2e:vj+jsMQMOtEvwDpj5Hczer5ixjn
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000300000001e9b1-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x000300000001e9b1-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation 2024-04-15_3720cf57d16e0c2409d49ee40f21c545_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4864 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2168 wrote to memory of 4864 2168 2024-04-15_3720cf57d16e0c2409d49ee40f21c545_cryptolocker.exe 86 PID 2168 wrote to memory of 4864 2168 2024-04-15_3720cf57d16e0c2409d49ee40f21c545_cryptolocker.exe 86 PID 2168 wrote to memory of 4864 2168 2024-04-15_3720cf57d16e0c2409d49ee40f21c545_cryptolocker.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_3720cf57d16e0c2409d49ee40f21c545_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-15_3720cf57d16e0c2409d49ee40f21c545_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:4864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5be21b870e7eb7b0b4035ff00cf2efcc9
SHA1eef8098cd7aaa55c2166ddff6a737c8885b89ce7
SHA2565518e463f02199d9a954cd14460afdcc4c252f8c805cf91f674c869afe1aef4a
SHA512848d0cd9db6aa4d36178f13b044a984f46b0f4c17eb8ea00159a2cf46fb46e21f9295a012f0553ad6f53ce680d996805bc64e0065d13c33ba298a678f04c12aa