Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-04-2024 21:33

General

  • Target

    2024-04-19_aeae4975f4f1a0d061312ebc860467f7_cryptolocker.exe

  • Size

    31KB

  • MD5

    aeae4975f4f1a0d061312ebc860467f7

  • SHA1

    ad074b48987a475333f3f04f6e65f7a1c59f2874

  • SHA256

    9002988006c12668209000a3f01f4a318c5b4c89ee3e8b6c9fcaaa9ff4c07fe4

  • SHA512

    54b18bcd363925df3d59bd16b7613e89d056f24d73a3e4b0a40538354e30943f484a4b29cf7aedee6aa13b7cd9619ce5812626eb2af196922a330ffbe2a0c782

  • SSDEEP

    384:bG74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUGTGO7:bG74zYcgT/Ekd0ryfjB

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-19_aeae4975f4f1a0d061312ebc860467f7_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-19_aeae4975f4f1a0d061312ebc860467f7_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:4408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    31KB

    MD5

    fd8b9955ecf807611ad39a263563a0fe

    SHA1

    cf1605386e64ea29d91d2469215554e9d5c319dd

    SHA256

    cc9344f101465433a0f0f0e4205a9984edd395309d32d236c679fc7630afa9db

    SHA512

    c4a41e9603c8f188deeb7da64473ff0e7f282691407ce6a2288f510cf965b126660f464f9214fb035c991e6af8aa8607e75c8852505d6e571f68b5b33c1bea9b

  • memory/2652-0-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/2652-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/2652-3-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB

  • memory/2652-2-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/2652-18-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/4408-17-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/4408-21-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/4408-20-0x0000000002210000-0x0000000002216000-memory.dmp

    Filesize

    24KB

  • memory/4408-27-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB