Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/06/2024, 04:24

General

  • Target

    2024-06-03_1ee7d737b8989996214df4464053d02b_cryptolocker.exe

  • Size

    45KB

  • MD5

    1ee7d737b8989996214df4464053d02b

  • SHA1

    fe34bf75270020e006530b566d30f66959a600fd

  • SHA256

    eac96ba70904fbcc76c37adeaf43bdfb7125708cb12afce83f5b2307922a0cda

  • SHA512

    304cd6584846cd1984a6803d668278f83e155182ea11c0e2bc4b02410e490b3f3f6f22bcbe86d09d4bdecaabadc562cf8c827d47036369201a6002d9dc2c1f03

  • SSDEEP

    384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jo0nrlwfjDUpaSwIfQrk:bm74zYcgT/Ekn0ryfjR1IfQrk

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-03_1ee7d737b8989996214df4464053d02b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-03_1ee7d737b8989996214df4464053d02b_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4892
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:3224

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          46KB

          MD5

          ecbdd5e4be06322733c7d9fc5a71f634

          SHA1

          e97ad94839e340438c8a8c1ab11c639167efacd5

          SHA256

          ce4922b57faf8b20c9ab14afd658c17a084ea9cbfb32ab7358bc39ffce0d4240

          SHA512

          5df2540227bbc1bf3d60258aa40f6972d319f63484846ac8cf1bef94062f0acb75bfd11aa9c030bf452186d0c2889ebfb2de0867fe8975164d4f2cf51e353a41

        • memory/3224-16-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB

        • memory/3224-20-0x0000000002160000-0x0000000002166000-memory.dmp

          Filesize

          24KB

        • memory/3224-21-0x0000000003150000-0x0000000003156000-memory.dmp

          Filesize

          24KB

        • memory/3224-27-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB

        • memory/4892-0-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB

        • memory/4892-1-0x0000000002250000-0x0000000002256000-memory.dmp

          Filesize

          24KB

        • memory/4892-2-0x0000000002300000-0x0000000002306000-memory.dmp

          Filesize

          24KB

        • memory/4892-9-0x0000000002250000-0x0000000002256000-memory.dmp

          Filesize

          24KB

        • memory/4892-18-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB