Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/04/2024, 19:57

General

  • Target

    2024-04-29_b1ec41cea6496f3b8109a6245a5cfdbc_cryptolocker.exe

  • Size

    47KB

  • MD5

    b1ec41cea6496f3b8109a6245a5cfdbc

  • SHA1

    d17b6717c170881f1449b750fe8fdadde1c6280c

  • SHA256

    359c919eabcf90228ba4b625d29a41a675514d2bd7795b6355930c914635acee

  • SHA512

    6bf3e4010e9fa6c6b9cc2eb9a6691a322d1edaf24971b38f12d6b7a171c8c476da3a181c6c66d2e123300aab255d8cfaeda6fca20e5a40360bcc5f76424306ca

  • SSDEEP

    768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4/Uth8igNrr42A7n0FmB0M1:vj+jsMQMOtEvwDpj5HczerLO04BX

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-29_b1ec41cea6496f3b8109a6245a5cfdbc_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-29_b1ec41cea6496f3b8109a6245a5cfdbc_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:712
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:440

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          47KB

          MD5

          a63f51b9164fd343b87791f868a2e09a

          SHA1

          c169c5f3c237f1a6cb75c44970558f3acf23039a

          SHA256

          38542f1a0502ab92216145f3bc9c40dbcf21477370a166975905a23770733e79

          SHA512

          f219ae02d516962411c1aabe189a8b97347ed0c5034b226addd3edb0459565b2fd1ba62effb736931424f1ecea2552d5a85c467c8904d9c99b8cef260bdb82fe

        • memory/440-17-0x0000000000760000-0x0000000000766000-memory.dmp

          Filesize

          24KB

        • memory/440-23-0x0000000000740000-0x0000000000746000-memory.dmp

          Filesize

          24KB

        • memory/712-0-0x0000000000630000-0x0000000000636000-memory.dmp

          Filesize

          24KB

        • memory/712-1-0x0000000000650000-0x0000000000656000-memory.dmp

          Filesize

          24KB

        • memory/712-8-0x0000000000630000-0x0000000000636000-memory.dmp

          Filesize

          24KB