Analysis

  • max time kernel
    73s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/06/2024, 00:38

General

  • Target

    2024-06-05_96aea6a86175a03bad99f550e2169037_cryptolocker.exe

  • Size

    38KB

  • MD5

    96aea6a86175a03bad99f550e2169037

  • SHA1

    add5702ffe74c4d3f784014449ad624c18cde67f

  • SHA256

    576aa56cf94ff8753bfe05448ecd5eaff35207e58aefeea089a1da005c4b8680

  • SHA512

    9c250979144e18a85144c18d5b8a0745c8c8a050610092a65cc2e3b31cd7101c9076cda466e483e8efc8838e7085dac43e572373efe0f5632c7c94e46aea1679

  • SSDEEP

    384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzl6A0X/EIjxuaPGB:b/yC4GyNM01GuQMNXw2PSjH+PPxVGB

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-05_96aea6a86175a03bad99f550e2169037_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-05_96aea6a86175a03bad99f550e2169037_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      PID:4876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\retln.exe

    Filesize

    39KB

    MD5

    48df7e8fb546084ea0b3d5fdb478eaa6

    SHA1

    65db05cbdafe662e3304b526abfca8e55cc93fd1

    SHA256

    ae72978a5db16ace563451c380ed1fe8a120da2250a58b2b38f63bd5b44f8ef8

    SHA512

    25c59a0126ea7cb496087049abd47989b1643ce9d45768d67dd53a6f3367b1ead08a66cceab7b3b09e834e2bf4c920d9e7eaf84777cc5a7717c4c6a2a96cac93

  • memory/2192-0-0x0000000002160000-0x0000000002166000-memory.dmp

    Filesize

    24KB

  • memory/2192-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2192-8-0x0000000002160000-0x0000000002166000-memory.dmp

    Filesize

    24KB

  • memory/4876-25-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB