Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 18:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-04_5944ce28f2be378c14c9a681429d1205_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-04_5944ce28f2be378c14c9a681429d1205_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-04_5944ce28f2be378c14c9a681429d1205_cryptolocker.exe
-
Size
34KB
-
MD5
5944ce28f2be378c14c9a681429d1205
-
SHA1
57e14b6981a52acc9e7bdde4e8a8fdf551792e82
-
SHA256
9008fff63b903a078c259352237b88470b54641986db50f944d91302773cd4b2
-
SHA512
6c779c28811dbd89643e1e2d8673a78dda31ad3a7327365d71f68b146e1a7dcbc13c56b473ed8c77e954c8916b9369f51a202ce5491268ea64e7981dadb4b2b7
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznStEkcsgqDxA:b/yC4GyNM01GuQMNXw2PSjSKkcJeA
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x00080000000233ce-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 2024-06-04_5944ce28f2be378c14c9a681429d1205_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 916 retln.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3660 wrote to memory of 916 3660 2024-06-04_5944ce28f2be378c14c9a681429d1205_cryptolocker.exe 82 PID 3660 wrote to memory of 916 3660 2024-06-04_5944ce28f2be378c14c9a681429d1205_cryptolocker.exe 82 PID 3660 wrote to memory of 916 3660 2024-06-04_5944ce28f2be378c14c9a681429d1205_cryptolocker.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-04_5944ce28f2be378c14c9a681429d1205_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-04_5944ce28f2be378c14c9a681429d1205_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
PID:916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5171662a2ec99e79b08af8403852ebc4b
SHA14c187ab38f9c9d6e96f98d8c4f255dd6f7df05f8
SHA2569f8faec52824f3da39f8d076fe95774d9e8a6200100a0777782b46ddd7ae3cc2
SHA512559908c8ddae27a5a14771ec4775df6490943cd1cae0db3f0fab38a7d6d8dba1b54968e3d8185c2271d0d6e31fa98ecba6356e51cd98067470ee60e2cb65d739