Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/05/2024, 14:01

General

  • Target

    2024-05-03_1eaa7404dc6c4fcee790cc4558080005_cryptolocker.exe

  • Size

    31KB

  • MD5

    1eaa7404dc6c4fcee790cc4558080005

  • SHA1

    4903fbb3cb8cbba9e4ee348c201a861f04c4cc9c

  • SHA256

    cdbb7d0cfd838abbb36d2240e302719d09ec2ca430e4ebdb36aac6fc68e15e37

  • SHA512

    fc02e0ee0a5abe7f90806463bf575801de9b923355d4708db315a82d364510ecd36dccb0f05a3dfb485f4d2de165e7b03c374f65c66f63759c0b1ea3b629c6e3

  • SSDEEP

    384:bG74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUGTG7E:bG74zYcgT/Ekd0ryfjJ

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-03_1eaa7404dc6c4fcee790cc4558080005_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-03_1eaa7404dc6c4fcee790cc4558080005_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4180
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2760

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          32KB

          MD5

          8c1fcda80ec7d70211883d4cd6ba303e

          SHA1

          7a8640e4e2ed9ac7a8270bf4fac63bef8081af77

          SHA256

          bed2c192f3fb2d6f10c14f739e91a5e1deded3e210a95c087562401dec2071bd

          SHA512

          e13c81396637f97d4d128770bc2a7a349d5bd784cf991394f44c00da2a01dfe4fb98e2757f44a4bab7ba28b9cb285fdbb25ff12d9a15a95a62ee2430fd2fc415

        • memory/2760-18-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB

        • memory/2760-20-0x0000000003010000-0x0000000003016000-memory.dmp

          Filesize

          24KB

        • memory/2760-26-0x0000000000600000-0x0000000000606000-memory.dmp

          Filesize

          24KB

        • memory/2760-27-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB

        • memory/4180-0-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB

        • memory/4180-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

          Filesize

          24KB

        • memory/4180-2-0x0000000003150000-0x0000000003156000-memory.dmp

          Filesize

          24KB

        • memory/4180-9-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

          Filesize

          24KB

        • memory/4180-17-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB