Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/06/2024, 00:38

General

  • Target

    2024-06-13_74d15f01ad5d7a8fa37a19f6dd6f20e6_cryptolocker.exe

  • Size

    39KB

  • MD5

    74d15f01ad5d7a8fa37a19f6dd6f20e6

  • SHA1

    0b3cc833d5d250297ecb31c0dd1bfbcc3b1bd948

  • SHA256

    a5b28dbc59034309d342cfe245a4ba1bbe0cdb1042c9cd26e5f6857cd48f6e71

  • SHA512

    818c0544d48b3083a9764ec41f9676a650751b13004c61e811915c11f2f45d12beb077ad7163699cf41b98799c9928e4f076cfe41767d2471d6039ca4026ee33

  • SSDEEP

    768:fTz7y3lhsT+hs1SQtOOtEvwDpjfAu9+4qd:fT+hsMQMOtEvwDpjoIHG

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-13_74d15f01ad5d7a8fa37a19f6dd6f20e6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-13_74d15f01ad5d7a8fa37a19f6dd6f20e6_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3688
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    39KB

    MD5

    9ec92e6065d73cf028b40c1aaccfb1a8

    SHA1

    695af4d568feb2c7feea1c51384649d8b9913e1f

    SHA256

    568f479764a87b51c81aea3bc118131e0a2810f8702b5a4f3c23fd92b52f5e4b

    SHA512

    3fcfa9160cf7b648f4062eefec2df3f1f79e5d1033a0725dfa3cb2f2ea4a45bf60b6640b540710591c2d27014948e702652bd8024a198e1eed60298b2c8fd4d5

  • memory/2680-17-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/2680-23-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3688-0-0x0000000002140000-0x0000000002146000-memory.dmp

    Filesize

    24KB

  • memory/3688-1-0x0000000002040000-0x0000000002046000-memory.dmp

    Filesize

    24KB

  • memory/3688-8-0x0000000002140000-0x0000000002146000-memory.dmp

    Filesize

    24KB