Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 02:26

General

  • Target

    2024-05-22_22649df334759e7a643e262d096ddb8c_cryptolocker.exe

  • Size

    44KB

  • MD5

    22649df334759e7a643e262d096ddb8c

  • SHA1

    9fc93bd59703c48b75229386e7bc17d7576af28f

  • SHA256

    deb383b85841d693970bdb57a8f3512958526727cab3c5ff6a413f3fa1415721

  • SHA512

    2512e8d5c00b00bd87aed74faa3da28540992a37259940d9894bb387e95e359e494bce53b9863bc2d73cfafd3e28b1d114170c2604376d37db980710cb9b2ded

  • SSDEEP

    768:b/yC4GyNM01GuQMNXw2PSjHPbSuYlW8PA4DwOoJR:b/pYayGig5HjS3NPAuwf/

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-22_22649df334759e7a643e262d096ddb8c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-22_22649df334759e7a643e262d096ddb8c_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      PID:368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\retln.exe

    Filesize

    44KB

    MD5

    4a6b1dd3e97767a1f58cf78138fa7c71

    SHA1

    4f09c9d1e58386e4b564811359ed3665d754b16f

    SHA256

    b38894a95457d00a662165ec556330caa461ce24a6dfbeb2733655da14bbaffc

    SHA512

    4c127cad5d1fc92e652cdd101e7ddf376c2126af60c7d532bca447726534e59bbb12b1198ce37e2ce7d84032705699f52cc79228581d9e9166fb0a09da3c4736

  • memory/368-25-0x0000000000530000-0x0000000000536000-memory.dmp

    Filesize

    24KB

  • memory/1448-0-0x00000000020C0000-0x00000000020C6000-memory.dmp

    Filesize

    24KB

  • memory/1448-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1448-8-0x00000000020C0000-0x00000000020C6000-memory.dmp

    Filesize

    24KB