Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2024, 05:44

General

  • Target

    2024-04-21_80358f471a357b16ee56ad806b0ec390_cryptolocker.exe

  • Size

    30KB

  • MD5

    80358f471a357b16ee56ad806b0ec390

  • SHA1

    d5425261997e06c3f7fcdc57f56040992ba60191

  • SHA256

    bde140002420b5ee34e522ade10b4714321242d5734bc335e2ff43fb7c41c059

  • SHA512

    ee4b6d791e02202b8aeb0018ca6be5e3d0f37f0b044724863749eef590c2d5101ed7ccfe5b0fbc12126cefb416b9dfc06fb1d5df100e17258d0f4f105a9c1808

  • SSDEEP

    384:bG74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUGTGS6:bG74zYcgT/Ekd0ryfj4

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-21_80358f471a357b16ee56ad806b0ec390_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-21_80358f471a357b16ee56ad806b0ec390_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4568
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:924

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          31KB

          MD5

          9fa1b43064eea4b245f94bf2d2e6f139

          SHA1

          ad654263de7cb1be139fef9cab25439865be0374

          SHA256

          1e922cd697ac88e6afd40e0ecc958c9caa3bf2f7b8b3bf46bde3a3fd1711bf0c

          SHA512

          6d720c873fb2ff2946af9ebd248c90511c7351d389d1b2806058083a027920fe456768177fe197f1d30e2e0f9093886c05d376c5e6455e0079c4f3785bc50d2a

        • memory/924-18-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB

        • memory/924-20-0x00000000022B0000-0x00000000022B6000-memory.dmp

          Filesize

          24KB

        • memory/924-22-0x0000000002200000-0x0000000002206000-memory.dmp

          Filesize

          24KB

        • memory/924-27-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB

        • memory/4568-0-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB

        • memory/4568-1-0x00000000021C0000-0x00000000021C6000-memory.dmp

          Filesize

          24KB

        • memory/4568-2-0x00000000021C0000-0x00000000021C6000-memory.dmp

          Filesize

          24KB

        • memory/4568-3-0x0000000003140000-0x0000000003146000-memory.dmp

          Filesize

          24KB

        • memory/4568-17-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB