Analysis
-
max time kernel
73s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 00:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-05_96aea6a86175a03bad99f550e2169037_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-06-05_96aea6a86175a03bad99f550e2169037_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-05_96aea6a86175a03bad99f550e2169037_cryptolocker.exe
-
Size
38KB
-
MD5
96aea6a86175a03bad99f550e2169037
-
SHA1
add5702ffe74c4d3f784014449ad624c18cde67f
-
SHA256
576aa56cf94ff8753bfe05448ecd5eaff35207e58aefeea089a1da005c4b8680
-
SHA512
9c250979144e18a85144c18d5b8a0745c8c8a050610092a65cc2e3b31cd7101c9076cda466e483e8efc8838e7085dac43e572373efe0f5632c7c94e46aea1679
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzl6A0X/EIjxuaPGB:b/yC4GyNM01GuQMNXw2PSjH+PPxVGB
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000600000002328f-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 2024-06-05_96aea6a86175a03bad99f550e2169037_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4876 retln.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2192 wrote to memory of 4876 2192 2024-06-05_96aea6a86175a03bad99f550e2169037_cryptolocker.exe 84 PID 2192 wrote to memory of 4876 2192 2024-06-05_96aea6a86175a03bad99f550e2169037_cryptolocker.exe 84 PID 2192 wrote to memory of 4876 2192 2024-06-05_96aea6a86175a03bad99f550e2169037_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-05_96aea6a86175a03bad99f550e2169037_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-05_96aea6a86175a03bad99f550e2169037_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
PID:4876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD548df7e8fb546084ea0b3d5fdb478eaa6
SHA165db05cbdafe662e3304b526abfca8e55cc93fd1
SHA256ae72978a5db16ace563451c380ed1fe8a120da2250a58b2b38f63bd5b44f8ef8
SHA51225c59a0126ea7cb496087049abd47989b1643ce9d45768d67dd53a6f3367b1ead08a66cceab7b3b09e834e2bf4c920d9e7eaf84777cc5a7717c4c6a2a96cac93