Analysis
-
max time kernel
6s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2024 15:13
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-03_24b1ebdc4f235209426d00e2d41f60e5_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-03_24b1ebdc4f235209426d00e2d41f60e5_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-03_24b1ebdc4f235209426d00e2d41f60e5_cryptolocker.exe
-
Size
45KB
-
MD5
24b1ebdc4f235209426d00e2d41f60e5
-
SHA1
d96545f7ff31674af2e8b86c4e494324dcdcd3c7
-
SHA256
c4db06bcb666732932aaed3b8c3224fa527b18c9fd3a88c03c4af2efc4a546a3
-
SHA512
2e2b1bed3f885c131db219c713220a9e40feeb5504cfd23970487dd7d37832c4e4b7431f0d1ac59bab3aa5bb87614618d56086abaedaaaae4c46e261c9c17048
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Yl6deMx:bgGYcA/53GAA6y37Q6dB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 2024-01-03_24b1ebdc4f235209426d00e2d41f60e5_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2904 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3780 wrote to memory of 2904 3780 2024-01-03_24b1ebdc4f235209426d00e2d41f60e5_cryptolocker.exe 44 PID 3780 wrote to memory of 2904 3780 2024-01-03_24b1ebdc4f235209426d00e2d41f60e5_cryptolocker.exe 44 PID 3780 wrote to memory of 2904 3780 2024-01-03_24b1ebdc4f235209426d00e2d41f60e5_cryptolocker.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-03_24b1ebdc4f235209426d00e2d41f60e5_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-03_24b1ebdc4f235209426d00e2d41f60e5_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5744a1fdf68a37e83e62bcd6f8eeb3708
SHA12f076388530894e045a6f650faae840ab8d92dd1
SHA256f8de4b304312a5b78e1d89efe48e4b93b16442b69231009d1f890338d2002a28
SHA51292b3e93bd2450a557b2492af09f955ba8681abe7793beb6152fddd71daaba79e185a4a25c5753b6c88de7e05211ff8c2a977fd58b679f7afe03de161c40eb3bb
-
Filesize
6KB
MD5662c19bf0cae4d7bfb2e5287c0359f3d
SHA15e57535bc0d79d2602e531f2e11e7b2e6eb27036
SHA2563e8157d76b93b2418706c6f2041008f139cbd1de1e49e76019b19525e03ecca9
SHA5127c6338ee0ee970e9f79cfdd4b4752b80b73cfb42b21824e99cde86feccf475bf63b4f3594ffb0f9adb874a1afc0cc79f5224ea47a720c38c1ff2843284a85d4f