Analysis
-
max time kernel
159s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 13:28
Behavioral task
behavioral1
Sample
2023-08-26_838c47c4270d397da107abbb2d97c146_cryptolocker_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_838c47c4270d397da107abbb2d97c146_cryptolocker_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_838c47c4270d397da107abbb2d97c146_cryptolocker_JC.exe
-
Size
81KB
-
MD5
838c47c4270d397da107abbb2d97c146
-
SHA1
73b9ba4c91196df8bfc24dc933195894dfa5f38f
-
SHA256
e6a943dbfe3f0ee894d29bdac3bc33bbf173992ad8e2d31705c81551e5cdbf26
-
SHA512
0f2a8d62f5c671bcc755c00df6f92de692fcf99291edd02ed86d7b010945f74873aa2e31d03566979477bb9f92c3d73c91c10c7d7a35bbd05ae1ad2341038dd0
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIS:qkmnpomddpMOtEvwDpjJGYQbN/PKwMS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 2023-08-26_838c47c4270d397da107abbb2d97c146_cryptolocker_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 2228 asih.exe -
resource yara_rule behavioral2/memory/4500-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/4500-1-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/4500-4-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/files/0x000700000002308e-18.dat upx behavioral2/files/0x000700000002308e-20.dat upx behavioral2/files/0x000700000002308e-21.dat upx behavioral2/memory/2228-30-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4500 wrote to memory of 2228 4500 2023-08-26_838c47c4270d397da107abbb2d97c146_cryptolocker_JC.exe 91 PID 4500 wrote to memory of 2228 4500 2023-08-26_838c47c4270d397da107abbb2d97c146_cryptolocker_JC.exe 91 PID 4500 wrote to memory of 2228 4500 2023-08-26_838c47c4270d397da107abbb2d97c146_cryptolocker_JC.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_838c47c4270d397da107abbb2d97c146_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_838c47c4270d397da107abbb2d97c146_cryptolocker_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD51f8ab829c132f524e570aa271617b33e
SHA15dfe71e035dec857a45d26232d84b31b68615a24
SHA256faa52d034b3c01b50672c5145f636afe15542a7f6abd5c5b67645d8be22d5aa4
SHA512716a50674c8d8ea59686c788ca0c17c88c0bc798ded3862b08b5e112a5041e7a9e2ef91e13de72096f445291c2d8db6a5698011877420ae9d87cb76bf0e5f9c8
-
Filesize
81KB
MD51f8ab829c132f524e570aa271617b33e
SHA15dfe71e035dec857a45d26232d84b31b68615a24
SHA256faa52d034b3c01b50672c5145f636afe15542a7f6abd5c5b67645d8be22d5aa4
SHA512716a50674c8d8ea59686c788ca0c17c88c0bc798ded3862b08b5e112a5041e7a9e2ef91e13de72096f445291c2d8db6a5698011877420ae9d87cb76bf0e5f9c8
-
Filesize
81KB
MD51f8ab829c132f524e570aa271617b33e
SHA15dfe71e035dec857a45d26232d84b31b68615a24
SHA256faa52d034b3c01b50672c5145f636afe15542a7f6abd5c5b67645d8be22d5aa4
SHA512716a50674c8d8ea59686c788ca0c17c88c0bc798ded3862b08b5e112a5041e7a9e2ef91e13de72096f445291c2d8db6a5698011877420ae9d87cb76bf0e5f9c8