Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 21:26

General

  • Target

    2024-05-15_2f10172d90cf2fac25eb2bc2a2310a70_cryptolocker.exe

  • Size

    44KB

  • MD5

    2f10172d90cf2fac25eb2bc2a2310a70

  • SHA1

    39178c5b343cbe2c5cf1359412a5165286d94fa1

  • SHA256

    65858e9ac2c2bc5ebbd8f3bf4da0191372f65a93ec9a1f8d8af03b9b148566f2

  • SHA512

    7b05037d1520fb0e9eee81024dd365a55e910c43dc3a864912d0748748767ee7613fa8f9d611dd345f2b25c44b5dd48c2ff8ec22ebdbd6fd6c0e2ba89372d064

  • SSDEEP

    768:b/yC4GyNM01GuQMNXw2PSjHPbSuYlW8PAg4:b/pYayGig5HjS3NPA1

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-15_2f10172d90cf2fac25eb2bc2a2310a70_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-15_2f10172d90cf2fac25eb2bc2a2310a70_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4012
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      PID:4708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\retln.exe

    Filesize

    44KB

    MD5

    df10c68c22a9a93040d74dfbc62d5b1d

    SHA1

    1ae722f339f3d095cea37b552ea3e9a4116f0711

    SHA256

    3468a678d7fcc31968c386fd99f32b0c5ca462c81326cb093c61e8c044a0798f

    SHA512

    703ccc670d7af226d0ea69e4254f3a5baa840d0f7122d84efce3d8f0f6edd2459c9975412928f0d4a9c01d912526ba2031cf5e27ee4dee621b569c00c5832764

  • memory/4012-0-0x0000000002160000-0x0000000002166000-memory.dmp

    Filesize

    24KB

  • memory/4012-8-0x0000000002160000-0x0000000002166000-memory.dmp

    Filesize

    24KB

  • memory/4012-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/4708-25-0x0000000002120000-0x0000000002126000-memory.dmp

    Filesize

    24KB