Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-04-2024 19:46

General

  • Target

    2024-04-21_1a27b4a1cb4d20738aefbfbd0e604346_cryptolocker.exe

  • Size

    52KB

  • MD5

    1a27b4a1cb4d20738aefbfbd0e604346

  • SHA1

    6e15c91503d9e1352916eb6282c0aa4c6a7caaa7

  • SHA256

    1094890b2a5b8622cb91334bb97fc0107082a9ce9326d3776b0c3a6950e45485

  • SHA512

    9ad4d823708c729cb8b6b002053e6c16b023ccba745a7e1e890855a11be82987e6c8764f084f328ecc1d6399ffdff5a35b659631067b1fd324229f5f88206192

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Yl6dIKld5CS4Gjn:bgGYcA/53GAA6y37Q6dI+d5QGz

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-21_1a27b4a1cb4d20738aefbfbd0e604346_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-21_1a27b4a1cb4d20738aefbfbd0e604346_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:3900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    52KB

    MD5

    bfb5f8911b4426d26899a77e69904be3

    SHA1

    9a91638afadc5d7010ba417cd08021a7c156735d

    SHA256

    9c06606012219c3401e27c324667c6c2c0906886a939ac9751ebdd48630bf298

    SHA512

    c4812bff0d89333be132c09c50734eb82c6e7b2268a226312bf1a885280f3538f5fb7954b0b1d94ff33d28a29b26987d7c23cd907fc994c1460a0e182a30a595

  • memory/2644-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/2644-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/2644-2-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB

  • memory/3900-17-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/3900-22-0x0000000002120000-0x0000000002126000-memory.dmp

    Filesize

    24KB