Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2024, 21:29

General

  • Target

    2024-04-19_6b813555ea3d1f770added3b92a00fd2_cryptolocker.exe

  • Size

    83KB

  • MD5

    6b813555ea3d1f770added3b92a00fd2

  • SHA1

    ebd3456b8791b8042718845b5f92115b0938e10c

  • SHA256

    e5bb61beb92e9f68a546ac24225bcb7a4bed34408f812c7237daa8142b98faf1

  • SHA512

    c1b5c227a944629077058012463977b17fdb2e5124e5e55ff575c7d4c2d57526e6c81c10c7e6cb209358a046582ea4004b536501692a8e1f94e1854ef25d738f

  • SSDEEP

    1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMMrCpc5:TCjsIOtEvwDpj5HE/OUHnSM+G

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-19_6b813555ea3d1f770added3b92a00fd2_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-19_6b813555ea3d1f770added3b92a00fd2_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3456
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:4924

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          83KB

          MD5

          4ea2f37b88ae0193484294338cdf0732

          SHA1

          20359c3d866e4bcab6305b5590d9aab6f720077d

          SHA256

          394db02c3e1ce944197c6bf3f43bf912cd9e6a286eb72cb9ce579e3d0d75c5f7

          SHA512

          252059fb6eb13462f0823d859d7a35ebb9e8f9952d60894fd4996519144f52901ff035a689727224d56b647142ab25b55f3a4d9cca4a6bff8c63b7475da65601

        • memory/3456-0-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/3456-1-0x0000000000690000-0x0000000000696000-memory.dmp

          Filesize

          24KB

        • memory/3456-2-0x0000000000690000-0x0000000000696000-memory.dmp

          Filesize

          24KB

        • memory/3456-3-0x0000000002060000-0x0000000002066000-memory.dmp

          Filesize

          24KB

        • memory/3456-17-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/4924-18-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/4924-20-0x0000000000640000-0x0000000000646000-memory.dmp

          Filesize

          24KB

        • memory/4924-23-0x0000000000620000-0x0000000000626000-memory.dmp

          Filesize

          24KB

        • memory/4924-27-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB