Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/06/2024, 10:25

General

  • Target

    2024-06-27_3198eaeec4fe00620a22e3dd076f243a_cryptolocker.exe

  • Size

    46KB

  • MD5

    3198eaeec4fe00620a22e3dd076f243a

  • SHA1

    f5dcfbc2f01e65578c8cf57351ebd0a70376949b

  • SHA256

    805aa49b2408090b7d2252dea766b0100efcabc45d45d18ad81533eb8c98d14b

  • SHA512

    e1c8986f357dd5ea5c1f77ce5861f7b9402f001944ef923adb1707166ab0b8ff13c281ef73d2c2a56ad422ba07cb69621a5d8f302da35b204535a519944d1129

  • SSDEEP

    384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jb0nrlwfjDUadQC8w:bm74zYcgT/EkM0ryfjPdQZw

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-27_3198eaeec4fe00620a22e3dd076f243a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-27_3198eaeec4fe00620a22e3dd076f243a_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4304
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1728

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          46KB

          MD5

          fecb99ef223e196051509f3524a0e7b7

          SHA1

          32e9f7d209b971ced7fac245cdfd489af04395c9

          SHA256

          ebb3e6d0c5607a5d265c1b6da7f078c58bb08c8ef6be2a4f7056b730797cd7c5

          SHA512

          c91fb2b6be9a99295b4aceba7a54f11dbfd9102129241a3b9f6c46eed31a1cddc34ceb13448addc62dca37ebdf596f1b2514eb46e9401572d6f27558f479cd03

        • memory/1728-16-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB

        • memory/1728-20-0x0000000003010000-0x0000000003016000-memory.dmp

          Filesize

          24KB

        • memory/1728-26-0x0000000002210000-0x0000000002216000-memory.dmp

          Filesize

          24KB

        • memory/1728-27-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB

        • memory/4304-0-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB

        • memory/4304-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

          Filesize

          24KB

        • memory/4304-3-0x0000000003150000-0x0000000003156000-memory.dmp

          Filesize

          24KB

        • memory/4304-2-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

          Filesize

          24KB

        • memory/4304-18-0x0000000008000000-0x000000000800D000-memory.dmp

          Filesize

          52KB