Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2024 05:52

General

  • Target

    2024-10-12_e0594fb6a193c8b5ed762f2458ce6c2f_cryptolocker.exe

  • Size

    41KB

  • MD5

    e0594fb6a193c8b5ed762f2458ce6c2f

  • SHA1

    064e56709c819bd63a76bd42a40f617e2f8e62a5

  • SHA256

    9d493c79359f655985ad546ea8c017db2cb593e5a5a1b663e9343735af7251b9

  • SHA512

    b1ecc54a7077039dae9642ff09cbfb9fa514649a94128cff583ad66d17fea430ddfe9a712fa1c92c3af8d5b70e031997984d7ba15cc718faa2d31b9c7364edef

  • SSDEEP

    768:bA74zYcgT/Ekd0ryfjPIunqpeNswmT3HwnCRB:bA6YcA/X6G0W143QA

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-12_e0594fb6a193c8b5ed762f2458ce6c2f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-12_e0594fb6a193c8b5ed762f2458ce6c2f_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3464
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    41KB

    MD5

    7c0b2253541c3e3ec9d1d8c8a1f31310

    SHA1

    5dc68d4ea0c4f0af93f9f6977ab3fa77cae12ab8

    SHA256

    3f27f07f3723b66bf2bc8418a2e9c28aeba8b7f5fda95ca175701cb06c091678

    SHA512

    60a14f69491eb3ab42fa51013bdc3522a276df15e6a0555ee17db969ecbf18dccfd4b260b64babf5b2cba3302d29e9f63a2d6eb97acbf207d9ec86e84b53baa2

  • memory/3464-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/3464-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/3464-2-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB

  • memory/4928-17-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/4928-23-0x0000000002D60000-0x0000000002D66000-memory.dmp

    Filesize

    24KB