Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2024, 10:38

General

  • Target

    2024-06-02_f3a103158af44cf47a349bc592e1d13f_cryptolocker.exe

  • Size

    37KB

  • MD5

    f3a103158af44cf47a349bc592e1d13f

  • SHA1

    f937a8450f293e96a31e7ccb037fbb3faf10e14d

  • SHA256

    4d129ddfe9a50c923b9b1da901804967c08d7cd89dd2d7a12218af91726c1d8a

  • SHA512

    0661599f3ba5b93e13c3d868b398d7feacb22b3a57a1dc356a73b9332c89246ae1aa50aadf777d62b7f68ccb0b439d65b534595c25532124ac6dd49fa3f8c96f

  • SSDEEP

    384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUgIunIVpeNs23mAA6lxZgHHaP:bA74zYcgT/Ekd0ryfjPIunqpeNswm69

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-02_f3a103158af44cf47a349bc592e1d13f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-02_f3a103158af44cf47a349bc592e1d13f_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    37KB

    MD5

    f5aca9884ba3f2ff94567be62dad044c

    SHA1

    944bc65d8bdc9e40e4a04559a73e98941ec7d487

    SHA256

    a827a55ee93ab0562b889f4934940fc53aeaa1662127c6ade9da736f2c1b15d4

    SHA512

    52d5d595f4562d8dca59586fea3bc3dc0aa8655ce04a70c8c06c9f8f67ca61557764fd2f728a4171410bd1bac938d398d982db1133c5e408e71af66d870ce423

  • memory/1548-17-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB

  • memory/1548-23-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/1616-0-0x0000000002250000-0x0000000002256000-memory.dmp

    Filesize

    24KB

  • memory/1616-8-0x0000000002250000-0x0000000002256000-memory.dmp

    Filesize

    24KB

  • memory/1616-1-0x0000000002300000-0x0000000002306000-memory.dmp

    Filesize

    24KB