Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2024, 23:22

General

  • Target

    2024-04-26_27aa71ffb977cc758036886c741d8aa4_cryptolocker.exe

  • Size

    40KB

  • MD5

    27aa71ffb977cc758036886c741d8aa4

  • SHA1

    1bec9f3d5bcef0512e2be6b4866bf403bf93d614

  • SHA256

    cad4e0574f4321cb7086ecd8a68644998bc5739f3756204d387364a1e98e153c

  • SHA512

    7f0eb32ef12ad269d6e27086dbebd23bec5262630d46cf60c031b50945bcd77765c1688f2a9d9104f13f1b76fa44b8cfeefbb02545afd0e95c17a75c5d89c101

  • SSDEEP

    384:ba74uGLLQRcsdeQ72ngEr4K7YmE8j6CQYnrz1ZhdaXFXSCVQTLfjDpXqxKHaZ:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKg

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • UPX dump on OEP (original entry point) 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-26_27aa71ffb977cc758036886c741d8aa4_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-26_27aa71ffb977cc758036886c741d8aa4_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:380
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1988
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1028 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1448

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

      Filesize

      40KB

      MD5

      c5922fba53b21dff10c388322e28ff7e

      SHA1

      1b74ffda2113dc422628ad3b2f36581f999fafb5

      SHA256

      2fcb0fb3d1f071e8edb6a9e5011b454cda6c675e9fa08686b63041e8ad084764

      SHA512

      5fa004a9e5f0403ed78676fa3c0dfae843b0c3ff49a0c26b0e982a103c25336e5c340297215107131b094946eba9d5f8db889dfdae42a341c1ce24aea3e21a29

    • memory/380-0-0x0000000008000000-0x000000000800F000-memory.dmp

      Filesize

      60KB

    • memory/380-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

      Filesize

      24KB

    • memory/380-2-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

      Filesize

      24KB

    • memory/380-3-0x0000000003150000-0x0000000003156000-memory.dmp

      Filesize

      24KB

    • memory/380-18-0x0000000008000000-0x000000000800F000-memory.dmp

      Filesize

      60KB

    • memory/1988-19-0x0000000003010000-0x0000000003016000-memory.dmp

      Filesize

      24KB

    • memory/1988-25-0x0000000002D60000-0x0000000002D66000-memory.dmp

      Filesize

      24KB

    • memory/1988-26-0x0000000008000000-0x000000000800F000-memory.dmp

      Filesize

      60KB