Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 03:22

General

  • Target

    2024-10-04_0064a0c4bb07f87119cb175acdb3889e_cryptolocker.exe

  • Size

    26KB

  • MD5

    0064a0c4bb07f87119cb175acdb3889e

  • SHA1

    91cedb7306788ebc08fe75bb9e9813d4554039c6

  • SHA256

    1f8a8d2a927f67ab5c689e30f1543563f536469feabc6be573f5754f45a50b7c

  • SHA512

    c00b558ac44ec7832fc4aedbf1d104544c12b15dcaea151931b69e92b17aaee8e1c93169cf0d04aee53cf35585c1b69ccced4cdca2c24e3e606a0e64f6686586

  • SSDEEP

    384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HMmHBdas:bVCPwFRo6CpwXFXSqQXfjAsmHBdl

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-04_0064a0c4bb07f87119cb175acdb3889e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-04_0064a0c4bb07f87119cb175acdb3889e_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4220
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    26KB

    MD5

    5f47c6e6d33c1702f5c7a0ffac722945

    SHA1

    b0e5298c2f47be17ff9158ebf693fb991362a9ae

    SHA256

    1bdb7f3ad7de389509ccd93e1740b75a33028c7e9cd3bfa574ee7f59d1afaa60

    SHA512

    7f8aa74fc275f8b9948067a4ee44d915a7a57c70ed64c3a557b5c0f0cc152c291ad592ed3cc63f5917861ea410f879ff62ec6910fdc41ac336ead2bdf54928a2

  • memory/4008-21-0x0000000003000000-0x0000000003006000-memory.dmp

    Filesize

    24KB

  • memory/4008-20-0x00000000005F0000-0x00000000005F6000-memory.dmp

    Filesize

    24KB

  • memory/4008-27-0x0000000008000000-0x000000000800E000-memory.dmp

    Filesize

    56KB

  • memory/4220-0-0x0000000008000000-0x000000000800E000-memory.dmp

    Filesize

    56KB

  • memory/4220-1-0x0000000002330000-0x0000000002336000-memory.dmp

    Filesize

    24KB

  • memory/4220-2-0x0000000002330000-0x0000000002336000-memory.dmp

    Filesize

    24KB

  • memory/4220-3-0x0000000002360000-0x0000000002366000-memory.dmp

    Filesize

    24KB

  • memory/4220-18-0x0000000008000000-0x000000000800E000-memory.dmp

    Filesize

    56KB