Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2024 00:33

General

  • Target

    2024-06-20_bd91db436b1183c5904d5a6d56beb7eb_cryptolocker.exe

  • Size

    50KB

  • MD5

    bd91db436b1183c5904d5a6d56beb7eb

  • SHA1

    3440d7313560cace1be9b2da3283193b33d1c785

  • SHA256

    e95132a1193b4dcbbd5b4874be6b346183ebd0b2d7737e6cd573364779d38247

  • SHA512

    0863619b14ea6f88293fb05d00ea64f54871bcef41eeeb77a96de1a960ca429521d27d56250a97f6d7a64c3b1493a6e82fbb56d609036e4ab5f4a94bbd6807ef

  • SSDEEP

    768:lQz7yVEhs9+4uR1bytOOtEvwDpjWE6BLbjG9Rva/yYsZnTa:lj+VGMOtEvwDpjy+viHss

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Detects executables built or packed with MPress PE compressor 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-20_bd91db436b1183c5904d5a6d56beb7eb_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-20_bd91db436b1183c5904d5a6d56beb7eb_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3700
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:1496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    51KB

    MD5

    4896c14be0624f751bb8ba6798d1355e

    SHA1

    4848da6704b6930b06702288be5f740cf9d45132

    SHA256

    628c209189a03c9fb4e154b2c0d9e9d5ddace23cf073d72cd3d7dbdde4b0edf1

    SHA512

    d4c5bf437ad8c61479ae5eb710eb373bd98b45488c032a3e91dfb96decadf0dbaee700f623d9904c097220917feab8cc83a8ecdc6f150a6a842bae721a834c68

  • memory/1496-18-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1496-20-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/1496-26-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1496-27-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3700-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3700-1-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/3700-2-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB

  • memory/3700-9-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/3700-16-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB