Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24-04-2024 17:26
Behavioral task
behavioral1
Sample
2024-04-24_1936e53ff34c2c2751a7776784f06494_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-24_1936e53ff34c2c2751a7776784f06494_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-24_1936e53ff34c2c2751a7776784f06494_cryptolocker.exe
-
Size
50KB
-
MD5
1936e53ff34c2c2751a7776784f06494
-
SHA1
afedb3dd864d0b123f801a2011578942aa2935fb
-
SHA256
90783fcd245b0e1480c56b8b5a3e00eb829e9e30c58f191b947c2cb5b15ad7f6
-
SHA512
51c8000c73e3b7900af790cf8636b6dc27d556ecc9214f46cea2068a27d4dcc1172f3a5fc7d8550cdee5eeeab6afc1bea409ce71a53cbcc11b767a0955d21085
-
SSDEEP
1536:nP+4zs2cPszL3MOtEvwDpj4Hy7B3g9CWuAxWLP:m4Q2ckzIOtEvwDpj4HY/
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral2/memory/1264-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x000300000001e970-13.dat CryptoLocker_rule2 behavioral2/memory/632-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral2/memory/1264-18-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral2/memory/632-27-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 2 IoCs
resource yara_rule behavioral2/memory/1264-18-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral2/memory/632-27-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral2/memory/1264-0-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral2/files/0x000300000001e970-13.dat UPX behavioral2/memory/632-17-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral2/memory/1264-18-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral2/memory/632-27-0x0000000000500000-0x0000000000510000-memory.dmp UPX -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation 2024-04-24_1936e53ff34c2c2751a7776784f06494_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 632 misid.exe -
resource yara_rule behavioral2/memory/1264-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x000300000001e970-13.dat upx behavioral2/memory/632-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1264-18-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/632-27-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1264 wrote to memory of 632 1264 2024-04-24_1936e53ff34c2c2751a7776784f06494_cryptolocker.exe 88 PID 1264 wrote to memory of 632 1264 2024-04-24_1936e53ff34c2c2751a7776784f06494_cryptolocker.exe 88 PID 1264 wrote to memory of 632 1264 2024-04-24_1936e53ff34c2c2751a7776784f06494_cryptolocker.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-24_1936e53ff34c2c2751a7776784f06494_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-24_1936e53ff34c2c2751a7776784f06494_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD56aa342a3325bd7d803928e7fae8d8663
SHA1e40ebd3cb2b4530fa1ecb2103c959533f4518edf
SHA25686c2caf10fb22378848d56f6b1542b2272ddb9088a12097f89e7db89801054e9
SHA5126a8effb523ce4344d90ca41aa61d06733a85e6981d4e99d3ac05e1a0f75d9ba61810301f961ec112c7745aa7a8520888f0e2c130bef08b6d8788e4a8a4c012ea