Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2024, 16:25

General

  • Target

    2024-04-19_0607769287c2ffb5c0956f0469df56e4_cryptolocker.exe

  • Size

    124KB

  • MD5

    0607769287c2ffb5c0956f0469df56e4

  • SHA1

    7da8b7495103333515dd4670ea8387b207c85bc8

  • SHA256

    f18b906b26c4f4f89c2e9fda7a1867b21e823e9ed979b370dfe98397097d708f

  • SHA512

    066af3bba4a81923f891fb1345e234853eec6ae3bf62a3ef215de0b40a145ad828d8711133f4048d28119c2b6e4b96f0f1268e9ddf50a215bc5ea0155a913bba

  • SSDEEP

    768:gUQz7yVEhs9+4T/1bytOOtEvwDpjNbZ7uyA36S7MpxRIIXVe3mU9TYwlOBTZ+mz:gUj+AIMOtEvwDpjNbwQEIPlemUhYpl

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-19_0607769287c2ffb5c0956f0469df56e4_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-19_0607769287c2ffb5c0956f0469df56e4_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:4408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    124KB

    MD5

    1ea202455a7d16a6c73788280c763bb2

    SHA1

    90760e2cc1dfce14d0c0d40abd8e8c69fcbcfce9

    SHA256

    3b15196d203a761d8985109e2b0ec74a6fdff7df25a327ce443674efbaa61250

    SHA512

    ed098a146af9d05bcc139c9404bfe015b766bda5a56563b11c76f81a2c998c61d6d647aad22531fdc99bc345419075896979cb66c6ec3ff863879c79c5463fbc

  • memory/540-0-0x00000000021D0000-0x00000000021D6000-memory.dmp

    Filesize

    24KB

  • memory/540-1-0x00000000021D0000-0x00000000021D6000-memory.dmp

    Filesize

    24KB

  • memory/540-2-0x00000000020F0000-0x00000000020F6000-memory.dmp

    Filesize

    24KB

  • memory/4408-18-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB

  • memory/4408-17-0x00000000006D0000-0x00000000006D6000-memory.dmp

    Filesize

    24KB