Analysis
-
max time kernel
153s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 05:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_bf83daf5f74be17801d2a22bf7fd93e7_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_bf83daf5f74be17801d2a22bf7fd93e7_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-01_bf83daf5f74be17801d2a22bf7fd93e7_cryptolocker.exe
-
Size
49KB
-
MD5
bf83daf5f74be17801d2a22bf7fd93e7
-
SHA1
ab97ab3c22293a62a296341ea52e364954ba6da4
-
SHA256
509ab923f7466871f32f64d07f8dc3b67ca1fa77547118f065d91a992da2a841
-
SHA512
4f91fffe906c30e561468a43047e32a63d7861689be35fcd0ac3f84c03be5ceee6ca6efed0e7d1c2121f74c524a7d0ad0919d891dc8786ba0d220d9c5e2c9adc
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpjeJQ7suIlsw92KFXpQenhP:V6QFElP6n+gMQMOtEvwDpjeJQ7pojk0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 2024-01-01_bf83daf5f74be17801d2a22bf7fd93e7_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4440 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4588 wrote to memory of 4440 4588 2024-01-01_bf83daf5f74be17801d2a22bf7fd93e7_cryptolocker.exe 96 PID 4588 wrote to memory of 4440 4588 2024-01-01_bf83daf5f74be17801d2a22bf7fd93e7_cryptolocker.exe 96 PID 4588 wrote to memory of 4440 4588 2024-01-01_bf83daf5f74be17801d2a22bf7fd93e7_cryptolocker.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_bf83daf5f74be17801d2a22bf7fd93e7_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_bf83daf5f74be17801d2a22bf7fd93e7_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD50a841be1c1edebf91c3b8a0be82e8eb7
SHA1bf0cac2d5ab95cd68eb586af9062b8e67e9992dd
SHA256e2c1ee955e19659b2434125fca24a30ff4e2c695d694b12b55936446e3bc1417
SHA51218017e1529c936ed8a2fcb1135712fcff8333dad744c7d569ac946e96472cb5f7aa6fbd42399b660ed91428e46ca1d34ef455f3fcf7669eb41e974717e4289aa