Analysis
-
max time kernel
0s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_69a9e996d37f132bddd2707939103e09_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-08_69a9e996d37f132bddd2707939103e09_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-08_69a9e996d37f132bddd2707939103e09_cryptolocker.exe
-
Size
89KB
-
MD5
69a9e996d37f132bddd2707939103e09
-
SHA1
7224c2c6bebbdf293e91248fcd1281e4cba9b37c
-
SHA256
7985f6b2798fefecf6f87636581f384766b3d4e2b35698abc5c0a6597a228ea3
-
SHA512
7d107cf3664f218cb3cd19237e89d24679715d0832acf76297712821f58154ce4694ac96d618c58698d0f547bd2526d637963991f68610ae8a11193fe305935a
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbNcqamvWHShl/3/C:V6a+pOtEvwDpjtw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 2024-01-08_69a9e996d37f132bddd2707939103e09_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4444 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4704 wrote to memory of 4444 4704 2024-01-08_69a9e996d37f132bddd2707939103e09_cryptolocker.exe 20 PID 4704 wrote to memory of 4444 4704 2024-01-08_69a9e996d37f132bddd2707939103e09_cryptolocker.exe 20 PID 4704 wrote to memory of 4444 4704 2024-01-08_69a9e996d37f132bddd2707939103e09_cryptolocker.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_69a9e996d37f132bddd2707939103e09_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_69a9e996d37f132bddd2707939103e09_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD57ef7a6f5b9e018f92927eb25010e0519
SHA1ab72ab3e9e83ca7cc2928307c0e0a3d6caabac48
SHA256c45ef5f15f8cdaf38165ec20c2d5aa2294c62a20839c4df0c6d2aededa298bf4
SHA5122d9b61b48b2063b3f2e9cb58de0c4bac35c261c1e55418495ad8260162861c0033e8d4c121e8d25b43d5407b8110ed6730739efdfdcf1513f6894967151c4a70