Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2024, 21:02

General

  • Target

    2024-05-20_2d2fe3249c92146a61372ffd509bf8fe_cryptolocker.exe

  • Size

    390KB

  • MD5

    2d2fe3249c92146a61372ffd509bf8fe

  • SHA1

    e8486ffef934aa2749eee47477828b826ae1fc96

  • SHA256

    804ba1a79aea7aa0c17547585bacb7251e5663892ecd75faa5a1fced0168750f

  • SHA512

    33ceeca26da9e331dc90183866ed5a2942cd2677d7a45597a8a35e62756c2962fea066de613d763a7f3795fa718552db26c1e4ee8bb5058510423f235bb6f357

  • SSDEEP

    6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXM:nnOflT/ZFIjBz3xjTxynGUOUhXM

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-20_2d2fe3249c92146a61372ffd509bf8fe_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-20_2d2fe3249c92146a61372ffd509bf8fe_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1572
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    391KB

    MD5

    bb999a8486c5264cb3474575a2066d40

    SHA1

    2e340a11da1189ac589df1760693bc0d453faff2

    SHA256

    0a14da761a775d7cb66904d2214f97ff22698cf2b5075a5607e81312aa484b6a

    SHA512

    f5e81f854d6cd899a84279454b374015248d0834f2da11f7c97ab5ab91c892fd3fd347f3289c22035c50323fd6c0a4def477f6c819d0c37c87c2d408091cdb25

  • memory/1572-0-0x0000000000640000-0x0000000000646000-memory.dmp

    Filesize

    24KB

  • memory/1572-1-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB

  • memory/1572-8-0x0000000000640000-0x0000000000646000-memory.dmp

    Filesize

    24KB

  • memory/2104-17-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/2104-23-0x0000000000740000-0x0000000000746000-memory.dmp

    Filesize

    24KB