Analysis
-
max time kernel
185s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:39
Behavioral task
behavioral1
Sample
2022-11-23_b5641ebb200bc913a7c171c956272d38_cryptolocker.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2022-11-23_b5641ebb200bc913a7c171c956272d38_cryptolocker.exe
Resource
win10v2004-20221111-en
General
-
Target
2022-11-23_b5641ebb200bc913a7c171c956272d38_cryptolocker.exe
-
Size
145KB
-
MD5
b5641ebb200bc913a7c171c956272d38
-
SHA1
330c8a98fa512017d92129c699e055196407af89
-
SHA256
d1772bb2f21aa227ee5f90c68dbf268ed09c45d079f6770c319fbd396c9bc587
-
SHA512
ec5eea4ebcf54f181a310790af5e3ca5f888f63b48b81442bc3bf63512977cc7caa7384b3074b68dd87f1345261e58189e64b537080dc182d9696781be295667
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GL4Z:z6a+CdOOtEvwDpjczL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
asih.exepid process 4148 asih.exe -
Processes:
resource yara_rule behavioral2/memory/732-139-0x0000000000500000-0x0000000000510000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\asih.exe upx C:\Users\Admin\AppData\Local\Temp\asih.exe upx behavioral2/memory/4148-151-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2022-11-23_b5641ebb200bc913a7c171c956272d38_cryptolocker.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 2022-11-23_b5641ebb200bc913a7c171c956272d38_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2022-11-23_b5641ebb200bc913a7c171c956272d38_cryptolocker.exedescription pid process target process PID 732 wrote to memory of 4148 732 2022-11-23_b5641ebb200bc913a7c171c956272d38_cryptolocker.exe asih.exe PID 732 wrote to memory of 4148 732 2022-11-23_b5641ebb200bc913a7c171c956272d38_cryptolocker.exe asih.exe PID 732 wrote to memory of 4148 732 2022-11-23_b5641ebb200bc913a7c171c956272d38_cryptolocker.exe asih.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2022-11-23_b5641ebb200bc913a7c171c956272d38_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2022-11-23_b5641ebb200bc913a7c171c956272d38_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4148
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD578acfd947340cd08f00f85bd626f378f
SHA19a6eae39ae0e01a39c2a34d28da053fb58143ce0
SHA256447b8674d32a496cba8ab296db1fae85cfa54be691bb388351b84de65a895eaf
SHA5123c21bd76ab8a5f915551d0d387fd6501a3b14482b25e97e24e695ff72a7577015175e2042fa3e0117673d09d6a264da250f6d7c2c80094344a37562bc472dd2a
-
Filesize
145KB
MD578acfd947340cd08f00f85bd626f378f
SHA19a6eae39ae0e01a39c2a34d28da053fb58143ce0
SHA256447b8674d32a496cba8ab296db1fae85cfa54be691bb388351b84de65a895eaf
SHA5123c21bd76ab8a5f915551d0d387fd6501a3b14482b25e97e24e695ff72a7577015175e2042fa3e0117673d09d6a264da250f6d7c2c80094344a37562bc472dd2a