Analysis
-
max time kernel
153s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2024 15:14
Behavioral task
behavioral1
Sample
2024-01-03_3f4fb282f915209d441677cc7fcdaaec_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-03_3f4fb282f915209d441677cc7fcdaaec_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-03_3f4fb282f915209d441677cc7fcdaaec_cryptolocker.exe
-
Size
74KB
-
MD5
3f4fb282f915209d441677cc7fcdaaec
-
SHA1
6eace95ce0a72e6972a39af18d08fac1dd79fef9
-
SHA256
39ebec5e1fecc3a7b34e7c68473d59f137c3b78fd5f84ad3860bac4bee28bca0
-
SHA512
17bc457051bc8476edd2bb1aa8cd3032375aa03e6b0975d7afa49485546f55b2abdbe8db908332a158b713aa0b1412fa0fb86d66e7cc7db915c6869175d4e38a
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdnD:T6a+rdOOtEvwDpjNtF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 2024-01-03_3f4fb282f915209d441677cc7fcdaaec_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3644 asih.exe -
resource yara_rule behavioral2/memory/1344-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x000400000001e716-13.dat upx behavioral2/memory/3644-18-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1344-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x000400000001e716-16.dat upx behavioral2/memory/3644-27-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1344 wrote to memory of 3644 1344 2024-01-03_3f4fb282f915209d441677cc7fcdaaec_cryptolocker.exe 36 PID 1344 wrote to memory of 3644 1344 2024-01-03_3f4fb282f915209d441677cc7fcdaaec_cryptolocker.exe 36 PID 1344 wrote to memory of 3644 1344 2024-01-03_3f4fb282f915209d441677cc7fcdaaec_cryptolocker.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-03_3f4fb282f915209d441677cc7fcdaaec_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-03_3f4fb282f915209d441677cc7fcdaaec_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD536ea2d8aa4133742702d0e4e86ac389f
SHA176c4a965e502da1c441828a807bc73785122808c
SHA256fc5274d727293305d4795e8875ae400454bd29806b84a5bd0b36cfa3237c706a
SHA512074b80327fc85ee33a741e0c5bcc533e1fa016d2d1306f4ef83bbdb20f420149165f61523ad6cb60661dd22a191e129c9207ee846bd11c5b9b194ac7a1669051
-
Filesize
74KB
MD51570ff11aacd05fdae85b7b7aab12527
SHA168fa8197b98bec8231440c648d5a195f916536a3
SHA2562f0a0ca65572f3323fb08fefa1e8f0cf4836980cee11480ef38e29915b12029a
SHA51285bd0ae4438fc6f5e9faee0fe7528b5d340b18a9db8bfb45226fc2f3d3000d15f5b5be7ed9b3ce8123752893567b4bb1a948de9032dd034765367cdc0509318d