Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/05/2024, 06:17

General

  • Target

    2024-05-22_fa1b263b2ef64164e1d80f4427b9329d_cryptolocker.exe

  • Size

    40KB

  • MD5

    fa1b263b2ef64164e1d80f4427b9329d

  • SHA1

    c83a526a4a458852eadb3d38db7fc2a537118200

  • SHA256

    a8c99e6b9337a34ea9411bb522dc0cc5f77c8906d4cb1b8b5ec3652ff6e0b658

  • SHA512

    a79a2097ceabd1470c5011d62d0b22c652601090b0069ffb9e5d655dde73b83db5243b04bc8e335501173cd6579f2488bd0f6119995bb93e1dbdf05ed82e1922

  • SSDEEP

    768:bA74zYcgT/Ekd0ryfjPIunqpeNswmxT4Hmp:bA6YcA/X6G0W1BGp

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-22_fa1b263b2ef64164e1d80f4427b9329d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-22_fa1b263b2ef64164e1d80f4427b9329d_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:384
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:3664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    40KB

    MD5

    84434aafc0e6702f07d7d80c7d6bfa1a

    SHA1

    eed478ef69ccc98ff3ddc95436bc2e7e627513c8

    SHA256

    5cb4051952a21e8af87c6ab6bcc7bf05c9facebd030d5288d0c9112242433227

    SHA512

    9056fb71c716718222f0143f24fae361b60f268f0a6f04a7ae1c20ee291d0d93f9f69dc9c5b343921844ff3f71d372b8661dc79975a83910eec466f26af5f168

  • memory/384-0-0x0000000002D60000-0x0000000002D66000-memory.dmp

    Filesize

    24KB

  • memory/384-1-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/384-8-0x0000000002D60000-0x0000000002D66000-memory.dmp

    Filesize

    24KB

  • memory/3664-17-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB

  • memory/3664-23-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB