Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 02:44

General

  • Target

    2024-05-22_ad45c0e242459a2e68d3e8565b6fbfff_cryptolocker.exe

  • Size

    33KB

  • MD5

    ad45c0e242459a2e68d3e8565b6fbfff

  • SHA1

    d1ce40fd8a86cb1a785450ace07d373bb8358947

  • SHA256

    3c0ee3505c17a7021ffdf287d6088161d23b1c9bcecde1f8ee8647c76c58981e

  • SHA512

    fb61c743402f844c0a05f1bc428a5be71a7d527a99e9f7dc8da55d50c2d94d7bd68f74734dfb6acfb97c59b84d3ba2cd155fb3e55e9bae7b79ee4a2527e99a67

  • SSDEEP

    384:bG74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUGTGLZ9t:bG74zYcgT/Ekd0ryfjgjt

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-22_ad45c0e242459a2e68d3e8565b6fbfff_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-22_ad45c0e242459a2e68d3e8565b6fbfff_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    33KB

    MD5

    9b676b60de0cee0f72eaeefaea3aa5d2

    SHA1

    28fbe01a6b410c994ca3982d2c9679ac0c4f423b

    SHA256

    32badf8a520b99c940b453320b42a541c0cd2396ce8a5af97f0489b970048c61

    SHA512

    f572f0421e84a11e68608a268204ac6af1544d0ce55b1e7640ceb280cd3bc302a61b834f5157e4c42abe75b7516cce6a032e778b62dd858d7a05448fb7f72987

  • memory/2352-0-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/2352-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/2352-2-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB

  • memory/2352-9-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/2352-17-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/2828-19-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/2828-25-0x0000000002120000-0x0000000002126000-memory.dmp

    Filesize

    24KB

  • memory/2828-26-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB