Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-01_ec5d319d94e1e9f29b6c5bb136f8521e_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-01_ec5d319d94e1e9f29b6c5bb136f8521e_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-01_ec5d319d94e1e9f29b6c5bb136f8521e_cryptolocker.exe
-
Size
35KB
-
MD5
ec5d319d94e1e9f29b6c5bb136f8521e
-
SHA1
7beb709be3cdac11f17cf3c6b22481cbd649abaf
-
SHA256
a1ca093ece2d62a81666a0532ef3d7af92fbd9431ec40723f53163db2932806e
-
SHA512
b61c2428695a79005f44ab119aee48757799bb810353852729339d7a50fb117d39075030e0dedf7096cda96e37bcbc8f7e52bf6f2e58817423970fa3ef489067
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznStEkcsgYKvld4:b/yC4GyNM01GuQMNXw2PSjSKkcJYKvlu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 2024-10-01_ec5d319d94e1e9f29b6c5bb136f8521e_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3488 retln.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-01_ec5d319d94e1e9f29b6c5bb136f8521e_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language retln.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 216 wrote to memory of 3488 216 2024-10-01_ec5d319d94e1e9f29b6c5bb136f8521e_cryptolocker.exe 82 PID 216 wrote to memory of 3488 216 2024-10-01_ec5d319d94e1e9f29b6c5bb136f8521e_cryptolocker.exe 82 PID 216 wrote to memory of 3488 216 2024-10-01_ec5d319d94e1e9f29b6c5bb136f8521e_cryptolocker.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-01_ec5d319d94e1e9f29b6c5bb136f8521e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-01_ec5d319d94e1e9f29b6c5bb136f8521e_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD56ac28b99bdb7735a14ecd8ac63f49f8d
SHA1d996ba9e14e22ce837dd487f131d4b80ca1479da
SHA256894c9e9b4295f5e2c0967b83e3c4ced66fe1566ff2070f166c5a079d723bbde6
SHA51204b9bac1e824c5df6813aab2239c1f50a0683c4c1464c4d341c13e98c18ff15ccb767ca57968b190b371356f1b6dcdd81b7fcf198e49f3b5e277ebfb9c37bfaa