Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-04-2024 19:47

General

  • Target

    2024-04-15_83c3245bdb2cf3de03175ce1e8464cfc_cryptolocker.exe

  • Size

    389KB

  • MD5

    83c3245bdb2cf3de03175ce1e8464cfc

  • SHA1

    6ec4d19c27dcd1b78ed05bc89d4fbe88563ea79c

  • SHA256

    22ce1309330d4969a5b4383908f7673278b5f2605470c6bf1d9fd92661bb7ec6

  • SHA512

    2bdf2ca27ef5016f4f13b34108c17c4bc3b56e5daa0928fa88e698a190eb664bff2f23b55e937243ec0439e6b51dcadbfc77da31f74b8cde26c8af15534ba1cf

  • SSDEEP

    6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXO:nnOflT/ZFIjBz3xjTxynGUOUhXO

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-15_83c3245bdb2cf3de03175ce1e8464cfc_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-15_83c3245bdb2cf3de03175ce1e8464cfc_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    389KB

    MD5

    95fe0d5e00fc10f04c9a9510ce26d9f8

    SHA1

    73cb05123adf9b6774c6f49dfc188d7226cdddbe

    SHA256

    f76e3fa43753cd62ed7e2e35145b11c64e15fa5372fa0aa32a650eb47ab59cc3

    SHA512

    1cf22c46b7b41345033d1d70115579bcc3e3485875d673a514e5e99af81a85c9a9495e055f7c39cfd7e781026c480f00217b73f4aafb345c462c77ec8f1ab85c

  • memory/216-0-0x00000000022C0000-0x00000000022C6000-memory.dmp

    Filesize

    24KB

  • memory/216-1-0x00000000022C0000-0x00000000022C6000-memory.dmp

    Filesize

    24KB

  • memory/216-2-0x00000000022F0000-0x00000000022F6000-memory.dmp

    Filesize

    24KB

  • memory/1120-19-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/1120-17-0x0000000002040000-0x0000000002046000-memory.dmp

    Filesize

    24KB