Analysis
-
max time kernel
136s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2024 12:15
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_bafac72ce03c0d5ccc8b877942fc7ece_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-06_bafac72ce03c0d5ccc8b877942fc7ece_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-06_bafac72ce03c0d5ccc8b877942fc7ece_cryptolocker.exe
-
Size
37KB
-
MD5
bafac72ce03c0d5ccc8b877942fc7ece
-
SHA1
c2144db574ebb5fde7ee4216876c98fa725b9f1a
-
SHA256
4dbd56566b617384d5a5403d043d8682114dfa2accd08fc74aaf464b581b3231
-
SHA512
be19d477aae5598c59aee7c30a1d2a06915ec6f9ae235a46866452d7d892145e8d92a51e17ae6a69399479b1077377c7b52785ad9e9a2305c653467cfec86bb8
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDDw3sCu529hBg:bgGYcA/53GADw8Ch93g
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 2024-01-06_bafac72ce03c0d5ccc8b877942fc7ece_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3928 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1164 wrote to memory of 3928 1164 2024-01-06_bafac72ce03c0d5ccc8b877942fc7ece_cryptolocker.exe 93 PID 1164 wrote to memory of 3928 1164 2024-01-06_bafac72ce03c0d5ccc8b877942fc7ece_cryptolocker.exe 93 PID 1164 wrote to memory of 3928 1164 2024-01-06_bafac72ce03c0d5ccc8b877942fc7ece_cryptolocker.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_bafac72ce03c0d5ccc8b877942fc7ece_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_bafac72ce03c0d5ccc8b877942fc7ece_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:3928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5fdb7d6dcf2930e282e9cdd8c67537c0f
SHA12f0dda5dd19a528799f8b8661829e74bd6573cd4
SHA25624e0bf1544caef299c5834224508bff7e2b7a5dbdbaf07ed2e862114daa09016
SHA512210b0fe49abb26cb9293f0f983ed60861bdaf2bd9693de25cb0fa21c06f98d61bb9e4016d6833298fcee2cb305d87adc5ff353d58542d3b7aceb8c88f1b53a68