Analysis

  • max time kernel
    130s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-05-2024 21:23

General

  • Target

    2024-05-16_13a7e9cd3f118f181a7fa5e3ad87179b_cryptolocker.exe

  • Size

    91KB

  • MD5

    13a7e9cd3f118f181a7fa5e3ad87179b

  • SHA1

    0ef49cb505f0b797e667723761d04465066aec3d

  • SHA256

    9d8682a717a0506d5d8b94b89ccfce44a4cd5aa922821e289aa32092511d38e6

  • SHA512

    81dec4eb2fe40ca6d5c9039741954080d01784e9a3d4c76c19b66ca21ebed7cba296aaab456bc9e367764e0bb9ee0c912a6f781d08d89db49927d9e849aa271c

  • SSDEEP

    1536:vj+jsMQMOtEvwDpj5H8u8rBN6nqEZNi1OkQor:vCjsIOtEvwDpj5H8zPsQ

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-16_13a7e9cd3f118f181a7fa5e3ad87179b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-16_13a7e9cd3f118f181a7fa5e3ad87179b_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:552
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies system certificate store
      PID:3172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    91KB

    MD5

    d6a97e8c1c1e8143442182a5d6087371

    SHA1

    05a219732a366cbae7b7be0d88974f777911ae01

    SHA256

    0a8305e457c475de49e5ce764094db2444c8ab19a7d54ec0203e153628c7cf90

    SHA512

    b5060d01c84b805d74ae7d422090b37eb3d103501705a88b729d36e850774b8f16c7c23aa8149824a5ea5b5c97fbf7c9eb1ff5459a3d4186b50f2455a8257e0a

  • C:\Users\Admin\AppData\Local\Temp\misids.exe

    Filesize

    315B

    MD5

    a34ac19f4afae63adc5d2f7bc970c07f

    SHA1

    a82190fc530c265aa40a045c21770d967f4767b8

    SHA256

    d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

    SHA512

    42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765

  • memory/552-0-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/552-1-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/552-2-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB

  • memory/3172-17-0x0000000002000000-0x0000000002006000-memory.dmp

    Filesize

    24KB

  • memory/3172-23-0x0000000001FD0000-0x0000000001FD6000-memory.dmp

    Filesize

    24KB