Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 07:46

General

  • Target

    2024-08-29_0e2924a71e2a6724783a2549bd8bccc9_cryptolocker.exe

  • Size

    35KB

  • MD5

    0e2924a71e2a6724783a2549bd8bccc9

  • SHA1

    2bdb5bc6c0071ac0795c61655fd99d916c2ded49

  • SHA256

    73d15e591700dbdc868ccd30374f2b0133618078ca0eeb7852204f6ea62f7793

  • SHA512

    fb2c33fce5146ee8924bfc82ff3908921138a9e3d20e80d1da55714d4d9ef33f66f560a67be6a5481f8931644292cf9c4b093ae77f96d5867c87d21e68e1aa5b

  • SSDEEP

    384:bG74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUGTGXvJF3SL97:bG74zYcgT/Ekd0ryfjkbCL97

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-29_0e2924a71e2a6724783a2549bd8bccc9_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-29_0e2924a71e2a6724783a2549bd8bccc9_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3880
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4572

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

          Filesize

          35KB

          MD5

          c1af7cc8a48831052d7028d1fe3cc7d6

          SHA1

          53b3536c923a90d30269ab8fd155a5b4fbd6f7e2

          SHA256

          2d7c1e5d6aaeab06435f278371c63493ee5894f56eeab26bc3282e24241379db

          SHA512

          fbb61fe9e618adca71f50c59c1704867d76fc95e6aebd359a9cb3bd49caa8f518a0f73d3c350a08f13bb0cfcfa54942130564e7ba042312c90f7ca2ab6bf53e3

        • memory/3880-0-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB

        • memory/3880-1-0x0000000002350000-0x0000000002356000-memory.dmp

          Filesize

          24KB

        • memory/3880-2-0x0000000002350000-0x0000000002356000-memory.dmp

          Filesize

          24KB

        • memory/3880-3-0x0000000003150000-0x0000000003156000-memory.dmp

          Filesize

          24KB

        • memory/3880-17-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB

        • memory/4572-19-0x0000000002090000-0x0000000002096000-memory.dmp

          Filesize

          24KB

        • memory/4572-25-0x0000000002020000-0x0000000002026000-memory.dmp

          Filesize

          24KB

        • memory/4572-26-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB