Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/04/2024, 03:33

General

  • Target

    2024-04-23_48b52379578f9fd87d30c7f574acf421_cryptolocker.exe

  • Size

    39KB

  • MD5

    48b52379578f9fd87d30c7f574acf421

  • SHA1

    068f0647df2ce1814ee237f90cf8fa6ab62c8b36

  • SHA256

    90dd7566c2af846d99c69579cda732ee3b43471f08afd1b663e179a37dfdd5c8

  • SHA512

    3abebea571f4d2be3de8b6cf94597f01014adfc5ca4736065fbbc24541d829dbec271347002ddd85dafeaedc4d85729321e22cf8c63887ba71420713926182d7

  • SSDEEP

    768:bA74zYcgT/Ekd0ryfjPIunqpeNswmxT4Hmk:bA6YcA/X6G0W1BGk

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-23_48b52379578f9fd87d30c7f574acf421_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-23_48b52379578f9fd87d30c7f574acf421_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5000
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2472

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          39KB

          MD5

          9bbb4c0049f8c6b004ce535dfaed46fc

          SHA1

          eec04729abc2e538a8e551dce55a6022b847e7e0

          SHA256

          36f7dbe2ac773de3f13ede2ccf5b0cc8300521120f4480bfb1931fb5cbf995ad

          SHA512

          885bc9e0c28283919c21a0c2c5213e246d1b7f1683f5ac440824f956ba9be9e515612a8b4ad5dfa03bd00f82c9bcf4eaedd46221e58bf0a721e26148e6ea51fb

        • memory/2472-17-0x0000000003010000-0x0000000003016000-memory.dmp

          Filesize

          24KB

        • memory/2472-19-0x0000000002010000-0x0000000002016000-memory.dmp

          Filesize

          24KB

        • memory/5000-0-0x0000000000700000-0x0000000000706000-memory.dmp

          Filesize

          24KB

        • memory/5000-1-0x0000000000700000-0x0000000000706000-memory.dmp

          Filesize

          24KB

        • memory/5000-2-0x0000000002190000-0x0000000002196000-memory.dmp

          Filesize

          24KB