Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2023 11:20
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_237239362c6c8f3dfc0ff2d30842c4d2_cryptolocker_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_237239362c6c8f3dfc0ff2d30842c4d2_cryptolocker_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_237239362c6c8f3dfc0ff2d30842c4d2_cryptolocker_JC.exe
-
Size
42KB
-
MD5
237239362c6c8f3dfc0ff2d30842c4d2
-
SHA1
fbc54e410a97c37931e985a954112f2fd9304cfd
-
SHA256
168ba2bf1db5ac17d23865d543c5da641c1526e95025c030eaed0d96c3ebfc73
-
SHA512
a3d0b6d505062e7789ed04cad6fa73daf23f3c7683aecc5bbd7081cd294a6cce1e46867afe761cfd45d8a6a42120db51b82f81a93b3f63a046726c67137a465c
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05w:qmbhXDmjr5MOtEvwDpj5cDtKkQZQw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation 2023-08-26_237239362c6c8f3dfc0ff2d30842c4d2_cryptolocker_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 2084 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 116 wrote to memory of 2084 116 2023-08-26_237239362c6c8f3dfc0ff2d30842c4d2_cryptolocker_JC.exe 86 PID 116 wrote to memory of 2084 116 2023-08-26_237239362c6c8f3dfc0ff2d30842c4d2_cryptolocker_JC.exe 86 PID 116 wrote to memory of 2084 116 2023-08-26_237239362c6c8f3dfc0ff2d30842c4d2_cryptolocker_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_237239362c6c8f3dfc0ff2d30842c4d2_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_237239362c6c8f3dfc0ff2d30842c4d2_cryptolocker_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD56a2d50d7b27a7d5a3840cd7d39f159f0
SHA1c35c1714abfd848392c8a7667b096e2c7eafd356
SHA2569e7a4bab7585d286d98950887dbf0dc5e96acf55893997e321f751f7ac720d55
SHA5123fca03e9f60b946470921684cb9aff40809ab5a15794ecdeb9a7fad5bc3966da40c3a5a635417fc50622608811431d6968020f7e289a1f307b47c57bc32997b7
-
Filesize
42KB
MD56a2d50d7b27a7d5a3840cd7d39f159f0
SHA1c35c1714abfd848392c8a7667b096e2c7eafd356
SHA2569e7a4bab7585d286d98950887dbf0dc5e96acf55893997e321f751f7ac720d55
SHA5123fca03e9f60b946470921684cb9aff40809ab5a15794ecdeb9a7fad5bc3966da40c3a5a635417fc50622608811431d6968020f7e289a1f307b47c57bc32997b7
-
Filesize
42KB
MD56a2d50d7b27a7d5a3840cd7d39f159f0
SHA1c35c1714abfd848392c8a7667b096e2c7eafd356
SHA2569e7a4bab7585d286d98950887dbf0dc5e96acf55893997e321f751f7ac720d55
SHA5123fca03e9f60b946470921684cb9aff40809ab5a15794ecdeb9a7fad5bc3966da40c3a5a635417fc50622608811431d6968020f7e289a1f307b47c57bc32997b7