Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 00:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_ee014c3b6bcb43e666f5629776b06dcc_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-16_ee014c3b6bcb43e666f5629776b06dcc_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-16_ee014c3b6bcb43e666f5629776b06dcc_cryptolocker.exe
-
Size
49KB
-
MD5
ee014c3b6bcb43e666f5629776b06dcc
-
SHA1
10eabbfc3ca9f44bfc5cdf6b3e15d5c57937f0b4
-
SHA256
6df4f7a1d8aacd8ada83b9195d0c8e147d15fb2b2b8628321dc7dc2985081264
-
SHA512
458f546feaff57be410242a0b8f4b2ac863da4fb01c64f0b3037c2e3cdc3f024e5b139ff269769e8ce6cdce7e99a57ee6637be029a2d87705f567c104df52903
-
SSDEEP
768:xQz7yVEhs9+4uR1bytOOtEvwDpjWE6BLtldedHE:xj+VGMOtEvwDpjk/eVE
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral2/memory/3812-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x001000000002324d-13.dat CryptoLocker_rule2 behavioral2/memory/3812-23-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral2/memory/4596-26-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral2/memory/3812-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral2/files/0x001000000002324d-13.dat CryptoLocker_set1 behavioral2/memory/3812-23-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral2/memory/4596-26-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
Detects executables built or packed with MPress PE compressor 4 IoCs
resource yara_rule behavioral2/memory/3812-0-0x0000000000500000-0x0000000000510000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x001000000002324d-13.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/3812-23-0x0000000000500000-0x0000000000510000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4596-26-0x0000000000500000-0x0000000000510000-memory.dmp INDICATOR_EXE_Packed_MPress -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2024-04-16_ee014c3b6bcb43e666f5629776b06dcc_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4596 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3812 wrote to memory of 4596 3812 2024-04-16_ee014c3b6bcb43e666f5629776b06dcc_cryptolocker.exe 91 PID 3812 wrote to memory of 4596 3812 2024-04-16_ee014c3b6bcb43e666f5629776b06dcc_cryptolocker.exe 91 PID 3812 wrote to memory of 4596 3812 2024-04-16_ee014c3b6bcb43e666f5629776b06dcc_cryptolocker.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_ee014c3b6bcb43e666f5629776b06dcc_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_ee014c3b6bcb43e666f5629776b06dcc_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3992 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:5528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD56a30a50f0a6529a0151bc0e23f01394e
SHA14fc6ea9b5f147145c4945f504823168f46c2ab25
SHA2565b0fcbd6ba77daa326a29ee00b894ca26efdbe60bca33d1f08a268cafef052ef
SHA512a55c91ba22038bed868b1a58461332eb7a863f50f9f075764457856b2294d729ea1e3f68bd82c0e9c8ae49634f3bc48516e55c9c676baddf6fa3a5f91d57cce3