Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-04-2024 07:32

General

  • Target

    2024-04-18_35276060ce475af2bc07e610a3bdbf76_cryptolocker.exe

  • Size

    81KB

  • MD5

    35276060ce475af2bc07e610a3bdbf76

  • SHA1

    e5beadb85541d8e08c06b01a774b41bfc7371cc7

  • SHA256

    49cf115e70704f9ef196d8cefe0abdbf5a8cccdca67f94dea8e8248dc3a956bd

  • SHA512

    b48a24fe54542408d6aaba4f9e9ce8d96678683ae4872b52f291b994fe6dd56e3ac490b5a5b13552216fbe07c015b9c7e8769ab633af350aee72a9ffce51f135

  • SSDEEP

    1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfWafHNqV5:vCjsIOtEvwDpj5H9YvQd2m

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-18_35276060ce475af2bc07e610a3bdbf76_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-18_35276060ce475af2bc07e610a3bdbf76_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:816
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:3776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    81KB

    MD5

    43bc0e636fa03e0d0d3542460aef68c4

    SHA1

    7c958a55378021843f0a4d20b75c92e5da06f947

    SHA256

    b751b395739abb7353c8325161a35e65e12e6dcbbc0a4d20d32ffedf46500f5e

    SHA512

    b468ff2d2642e896908c9e3b28f6e44eb62245ef5a73912d5d83ae960734ce5702f10495c8a795e8a78f4d82348a0818fd045bb2694cefc2f44716891eb40cb7

  • memory/816-0-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/816-1-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/816-2-0x00000000021A0000-0x00000000021A6000-memory.dmp

    Filesize

    24KB

  • memory/3776-17-0x00000000007C0000-0x00000000007C6000-memory.dmp

    Filesize

    24KB

  • memory/3776-18-0x0000000000650000-0x0000000000656000-memory.dmp

    Filesize

    24KB