Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-05-2024 19:27

General

  • Target

    2024-05-30_92dd7156244a3027e8cdae993f788f2b_cryptolocker.exe

  • Size

    31KB

  • MD5

    92dd7156244a3027e8cdae993f788f2b

  • SHA1

    678cc242b9fa9468abef99dc969894fb8dfcfd27

  • SHA256

    b76f4569cb1a0d78d853ea99ee4e6a2113f861033f2d17bc8566126bdc2b515d

  • SHA512

    eecaf5154fca945feaf6b9444f136d7eb3591fbc485d4add48e0751b0299cf7dcfb687dc24d37293779fe9e94a3e2f9eeee20e4132d2385c3bbd44296d87143b

  • SSDEEP

    384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zznum+U8Ss87vhi6:b/yC4GyNM01GuQMNXum+NSni6

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-30_92dd7156244a3027e8cdae993f788f2b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-30_92dd7156244a3027e8cdae993f788f2b_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1020
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      PID:1472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\retln.exe

    Filesize

    31KB

    MD5

    d2605b8c353aa5bb2b9503437b231dd8

    SHA1

    ff719305bce33d29288cee870eaec89dada02d25

    SHA256

    d4b594bb7137fd9d807ee19f7f3db8d3021264bf4d3f8b4c051b0b6aa1408064

    SHA512

    4966447e57df814d230798462f248a9718eacde2f6b37ced8395121fef5427ba1aece4f183968ae442c3627b1374f8f7131ad65eed08600af636538cf87e2c00

  • memory/1020-0-0x0000000002150000-0x0000000002156000-memory.dmp

    Filesize

    24KB

  • memory/1020-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1020-8-0x0000000002150000-0x0000000002156000-memory.dmp

    Filesize

    24KB

  • memory/1472-25-0x0000000002090000-0x0000000002096000-memory.dmp

    Filesize

    24KB