Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 16:56

General

  • Target

    2024-05-09_ff799466e5d0f58ee3f854d12f048bf3_cryptolocker.exe

  • Size

    35KB

  • MD5

    ff799466e5d0f58ee3f854d12f048bf3

  • SHA1

    daf67e5817d04dd2768da4e9ea80c22c70ef53c4

  • SHA256

    85f5d7060ae28b4066e0453210afff27e9b7fb84baf7a6952e532acd3ad82d69

  • SHA512

    115e01a35783ea4542ad2e0c6fb40227958df9562dbeed747550c5cd64fd51af428e92580342fca500aa7967d722b2963d86d7f6bf971cc14d0e7f1e334ce5ee

  • SSDEEP

    768:bA74zYcgT/Ekd0ryfjPIunqpeNswm6GZC:bA6YcA/X6G0W1PGZC

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-09_ff799466e5d0f58ee3f854d12f048bf3_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-09_ff799466e5d0f58ee3f854d12f048bf3_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3888
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:4492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    35KB

    MD5

    2fc2735247872d0655e19bb74cc27821

    SHA1

    ac5420b8f2d98dbd050c31dbd9b370906643a4dd

    SHA256

    ffcdf14d66c814c0daed5449eb5a7275f9191555eee8799fbb0136c86b7cbb5d

    SHA512

    d1e0837803c801c01b7dc0510d82bc12c90a7e7c6178c65b2cf5c9b535b3ec9972e30a1f234f6c826a853d8804d2dbba0c7d85400e77ab3f7179c695fa733347

  • memory/3888-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/3888-8-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/3888-1-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB