Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/06/2024, 19:08

General

  • Target

    2024-06-13_ca88bcd89ec9edd8d9dc795d191e256a_cryptolocker.exe

  • Size

    391KB

  • MD5

    ca88bcd89ec9edd8d9dc795d191e256a

  • SHA1

    3b7a74e1a91f4291ca4b4816cd16c0241433ff10

  • SHA256

    6382547eadd9de0535b61a33693553f863bdc815d936ad7020f7275ecc455f0b

  • SHA512

    e44a17ec363d5341d4218b67fdb1532a1e03fef388099408527485c88f2028e5464a3f959d884c4ceb1edacf61641e8b03e2e2eee043d6397b8723ebdd103b1e

  • SSDEEP

    6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXRC:nnOflT/ZFIjBz3xjTxynGUOUhXRC

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-13_ca88bcd89ec9edd8d9dc795d191e256a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-13_ca88bcd89ec9edd8d9dc795d191e256a_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4356
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:5068

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          391KB

          MD5

          0e7e9db41ac0b8bc3964030311dd188c

          SHA1

          95a2965bb63aaa7a66a019b6edb263cf3550c23f

          SHA256

          3c93449047dea06e957e18744ee2cff4968ad85048028373ed9ae2d76b924127

          SHA512

          a4a3ea45601b772c7ba4a0a8b3153384f8997dd1f91cf935fb67f4b0d50687075d2e9c1675b6a46fc9413f3eb88e316c198222e020e1ca0dc447f8f5aa9a2260

        • memory/4356-0-0x00000000006F0000-0x00000000006F6000-memory.dmp

          Filesize

          24KB

        • memory/4356-2-0x0000000002140000-0x0000000002146000-memory.dmp

          Filesize

          24KB

        • memory/4356-8-0x00000000006F0000-0x00000000006F6000-memory.dmp

          Filesize

          24KB

        • memory/5068-23-0x0000000002210000-0x0000000002216000-memory.dmp

          Filesize

          24KB

        • memory/5068-17-0x0000000003010000-0x0000000003016000-memory.dmp

          Filesize

          24KB