Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/04/2024, 10:09

General

  • Target

    2024-04-28_92f21d1d835df37a79e8ea4c6ff738a3_cryptolocker.exe

  • Size

    43KB

  • MD5

    92f21d1d835df37a79e8ea4c6ff738a3

  • SHA1

    0154d2a28aa8ca9b92de0f3cf48cc7d0278b5af3

  • SHA256

    f6409bd73fff0fe63c8c26c7a614205c4d49c16990e4a5113cb6866fce81edac

  • SHA512

    887ff3dbec0967aa64f833e872a05c979903a587977a11e4fa6c46ce3e3d151dfbc2d2a5f1b8a55e97a752301f08034a6f40ee0b6d1dd673d1fae267cebc353e

  • SSDEEP

    384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jo0nrlwfjDUJZ:bm74zYcgT/Ekn0ryfjqZ

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-28_92f21d1d835df37a79e8ea4c6ff738a3_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-28_92f21d1d835df37a79e8ea4c6ff738a3_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4376
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    43KB

    MD5

    9e86848b7a3c687268597680a5bd5d28

    SHA1

    96907db0ecc983382df005a412eab53f2f42e7b1

    SHA256

    8fa163c7e55fb797569990ab468b9557358ee9b05c35c0dbe36a5f1519052b8d

    SHA512

    941d20f6d0cac5b5a25c834b6a11c090445178deccdd32230d5181ee30c69a1c912af52431dfba41ea47a510ef868e945de61b8bda1aaee286f88e5a811bac28

  • memory/3032-18-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB

  • memory/3032-20-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/3032-26-0x0000000002090000-0x0000000002096000-memory.dmp

    Filesize

    24KB

  • memory/3032-27-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB

  • memory/4376-0-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB

  • memory/4376-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/4376-2-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB

  • memory/4376-9-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/4376-17-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB