Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2024 15:24

General

  • Target

    2024-10-12_fe07e41be3f6298c7febe3fb92468a83_cryptolocker.exe

  • Size

    46KB

  • MD5

    fe07e41be3f6298c7febe3fb92468a83

  • SHA1

    8809be62857c5e92f45169be908f49378dead5a7

  • SHA256

    840d6202cf4aef93eba58c8b14d15cc9684c0cc751b48d5ca4818e1acc893aaa

  • SHA512

    aff241a0215301a731e49e5a0b955e86955ce81226d30809d4ca806f46e58672a975acd291b1ac99bf55d161d4fc5a0ed169159b8dd3045aa525cb4f9b6cbdcd

  • SSDEEP

    384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jb0nrlwfjDUk3b+NKIF:bm74zYcgT/EkM0ryfjd3WKIF

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-12_fe07e41be3f6298c7febe3fb92468a83_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-12_fe07e41be3f6298c7febe3fb92468a83_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    46KB

    MD5

    a75ee5636a1557e5e6614e41033cdeec

    SHA1

    011921c37c3205e5864c1b2c15e109dffa127b2b

    SHA256

    79875d02b376ee299679cb3fa3bffd303224a5ba09b947546c31faeca4327ef4

    SHA512

    32a2d5f8202a5713ae6ce7949ee7644ab39fef9050ab631c54927461137be195eecde4a52dbe0be662dd4f77dd6dfe14f73feb910232d2c9fe32bfe1d31583b1

  • memory/2216-0-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB

  • memory/2216-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/2216-2-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/2216-3-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB

  • memory/2216-17-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB

  • memory/4492-25-0x0000000002090000-0x0000000002096000-memory.dmp

    Filesize

    24KB

  • memory/4492-19-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/4492-26-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB