Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2024, 22:32

General

  • Target

    2024-04-20_847d8a42f17da8c6c33fcf823bf7901b_cryptolocker.exe

  • Size

    39KB

  • MD5

    847d8a42f17da8c6c33fcf823bf7901b

  • SHA1

    e93812d567015be1a5ca5619aa13a8038bbb278d

  • SHA256

    1d1244b1de201da94d7d1cf6923e059c681baa2b0edcd48be69f4d548a13871f

  • SHA512

    65bbde56fc1bc623c9cf9192f6a1ee3bfb4d0c5614c8212049d0d45c848778f48056c3334460ef8c07efa4aac05d870b72c845290488aef95b18cdd57f8e925f

  • SSDEEP

    768:bA74zYcgT/Ekd0ryfjPIunqpeNswmxT4HmQ:bA6YcA/X6G0W1BGQ

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-20_847d8a42f17da8c6c33fcf823bf7901b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-20_847d8a42f17da8c6c33fcf823bf7901b_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2892

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          39KB

          MD5

          b51e2a349ab4166508ed865cbae554eb

          SHA1

          fd4da9fd2d2edea3cebd4405e385528e460c7b99

          SHA256

          8de6f792cce0ac7bfb478e1f37a13c82214e5dfb634063e5e6891f8f8f57cf2b

          SHA512

          5b9f80f721e5efb7f7b062e603912477d5111cb7914e8c276c473eb8e72f401b3fd5bdccc0d522c75f3b623ee7f6b48a5e672b87dd3db84c7ea29585489f19e0

        • memory/2876-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

          Filesize

          24KB

        • memory/2876-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

          Filesize

          24KB

        • memory/2876-2-0x0000000003150000-0x0000000003156000-memory.dmp

          Filesize

          24KB

        • memory/2892-17-0x0000000002D60000-0x0000000002D66000-memory.dmp

          Filesize

          24KB

        • memory/2892-18-0x0000000003010000-0x0000000003016000-memory.dmp

          Filesize

          24KB