Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-06-2024 18:25

General

  • Target

    2024-06-12_0e9c1b6c3f65725edc94a274e1cd3afc_cryptolocker.exe

  • Size

    71KB

  • MD5

    0e9c1b6c3f65725edc94a274e1cd3afc

  • SHA1

    5020ea0369d4464491edb5833768407c1d03c7b9

  • SHA256

    ba71b32eb2a35e79b50a91c4e934421228161422fb56ada3fa132386e46aab56

  • SHA512

    8735eacfbf448e73216eca600926b53a635e5d4ce09918dd2182c951fd26894aeef02999b091ed31739574ce4c12acb09ef446832a4fe89bcec7be818ced7ec4

  • SSDEEP

    768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4ZPsED3VK2+ZtyOjgO4r9vFAg2rq2g1B/R3:vj+jsMQMOtEvwDpj5HZYTjipvF24/

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-12_0e9c1b6c3f65725edc94a274e1cd3afc_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-12_0e9c1b6c3f65725edc94a274e1cd3afc_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:5092
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1324,i,13879737908471496610,15335851594401413307,262144 --variations-seed-version --mojo-platform-channel-handle=4320 /prefetch:8
    1⤵
      PID:1316

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\misid.exe

      Filesize

      71KB

      MD5

      f76c3f932d9b23280ffb15c369ebe6d9

      SHA1

      7abfe4636c809f75b8d4d6e9f3b08f1ab8c05da0

      SHA256

      26fd8f6e86054d3d86de98571afbee220395a5f3e5234ceddecea5537244beed

      SHA512

      0334eeadf387939c711c11306772919751e59f4455d73a7d536755aac1991517d8127bcf0daca594228620248d68ce0203487b0bb0b687853a6f313f0a5856b2

    • memory/1072-0-0x00000000004D0000-0x00000000004D6000-memory.dmp

      Filesize

      24KB

    • memory/1072-2-0x00000000004F0000-0x00000000004F6000-memory.dmp

      Filesize

      24KB

    • memory/1072-8-0x00000000004D0000-0x00000000004D6000-memory.dmp

      Filesize

      24KB

    • memory/5092-17-0x00000000006C0000-0x00000000006C6000-memory.dmp

      Filesize

      24KB

    • memory/5092-23-0x00000000006A0000-0x00000000006A6000-memory.dmp

      Filesize

      24KB