Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2024, 19:55

General

  • Target

    2024-04-20_a32f295dd7736bf55b30fcafaa92fca5_cryptolocker.exe

  • Size

    389KB

  • MD5

    a32f295dd7736bf55b30fcafaa92fca5

  • SHA1

    9c06576617937ec44d2e667c71921e5230316c43

  • SHA256

    6ce91229db5ea2749df31308b95cb7ed429032f69c900c6d8643d4c672df0cb9

  • SHA512

    fcf75890b674b8b866e8892fc132a179fe3dee5f621342d9ceea5768242a0b48cbc840a6ba8afb973b74fcb83c8969f15d5a5bcc9d924d3011abd263fd8a155d

  • SSDEEP

    6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXU:nnOflT/ZFIjBz3xjTxynGUOUhXU

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-20_a32f295dd7736bf55b30fcafaa92fca5_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-20_a32f295dd7736bf55b30fcafaa92fca5_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4412
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    389KB

    MD5

    cbec2140961cbe5505217c355a169fe1

    SHA1

    917cc574e9a9c9c3f39583cc829ea005e0f0b3b5

    SHA256

    0242de6f865b1f3123bf58ae9fa9bc4f5c9c8d67fa867b6eefc35f46faad4004

    SHA512

    86ca9e452a19c8e2f22946b1a7b7643c6b5146edfcd4fab5e3d07b021e2ee8f9fc31a0c33b7809d5018263df4c2a59298ad93f35bcd185eac9ee0ffb57408e4c

  • memory/2252-17-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/2252-23-0x00000000020A0000-0x00000000020A6000-memory.dmp

    Filesize

    24KB

  • memory/4412-0-0x0000000002260000-0x0000000002266000-memory.dmp

    Filesize

    24KB

  • memory/4412-1-0x0000000002260000-0x0000000002266000-memory.dmp

    Filesize

    24KB

  • memory/4412-2-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB