Analysis

  • max time kernel
    137s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2024, 01:45

General

  • Target

    2024-05-24_73ae23f901b84832d0fbceab9120c846_cryptolocker.exe

  • Size

    45KB

  • MD5

    73ae23f901b84832d0fbceab9120c846

  • SHA1

    77aaa43b7e7f388cd69318b950772a22d6e77ae5

  • SHA256

    c608754f9789eacbf164db1ac1decbf6a8865585543d62f0733cfecba941abb7

  • SHA512

    5d5a0bacad1594127c3f371703702812fa12461e04c0c0b48ea1f042752c1e46c341073d5187fea6c3ea542bac732b4cb38d7eb37c793d44538228f73daec0a9

  • SSDEEP

    768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvhx5/xFRp5jl2N:m5nkFNMOtEvwDpjG8hhXj5w

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Detects executables built or packed with MPress PE compressor 5 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-24_73ae23f901b84832d0fbceab9120c846_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-24_73ae23f901b84832d0fbceab9120c846_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies system certificate store
      PID:4104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    45KB

    MD5

    8403821e74b80db8c63d0cb541edd35a

    SHA1

    c1e63f38f8a3a9832690dced4b363567a8eaf8ca

    SHA256

    c8db142ba10efb89dddc0412a212325d72790cb758a70694c9c1a38979cf9324

    SHA512

    7e2b1f31d56c4dded3ca26a15a8f1b92b3bcda58a116550b8ab16f38970ddc917cb7a97cc5ae0e1c2547f7e5d655b420419f8dce82c1c0d4ce8b2397d0d5759b

  • C:\Users\Admin\AppData\Local\Temp\misids.exe

    Filesize

    315B

    MD5

    a34ac19f4afae63adc5d2f7bc970c07f

    SHA1

    a82190fc530c265aa40a045c21770d967f4767b8

    SHA256

    d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

    SHA512

    42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765

  • memory/2648-0-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB

  • memory/2648-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/2648-2-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/2648-9-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/2648-17-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB

  • memory/4104-18-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB

  • memory/4104-21-0x0000000002070000-0x0000000002076000-memory.dmp

    Filesize

    24KB

  • memory/4104-20-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/4104-51-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB