Analysis
-
max time kernel
19s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_4ccc4262c5fe792f29d87e941c4e26c3_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_4ccc4262c5fe792f29d87e941c4e26c3_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-09_4ccc4262c5fe792f29d87e941c4e26c3_cryptolocker.exe
-
Size
38KB
-
MD5
4ccc4262c5fe792f29d87e941c4e26c3
-
SHA1
f289c91338a7f80ee9ea4b058734577aeb2032c5
-
SHA256
b14df68e646e3c8f0abca4a93e393df9cec3ff77b2eec5616e601d984577426e
-
SHA512
ff00c17c7c0c80d7cf0e4bd48c184419fdab60d7a12eb5c35c4426e69646acfaf50f82a56efcd19128f1c72f56c91b33ad284b3eddde773ea7ace5b00ab3842f
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDDw3sCu5b+rhMT:bgGYcA/53GADw8ClrhMT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 2024-01-09_4ccc4262c5fe792f29d87e941c4e26c3_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3660 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 444 wrote to memory of 3660 444 2024-01-09_4ccc4262c5fe792f29d87e941c4e26c3_cryptolocker.exe 40 PID 444 wrote to memory of 3660 444 2024-01-09_4ccc4262c5fe792f29d87e941c4e26c3_cryptolocker.exe 40 PID 444 wrote to memory of 3660 444 2024-01-09_4ccc4262c5fe792f29d87e941c4e26c3_cryptolocker.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-09_4ccc4262c5fe792f29d87e941c4e26c3_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-09_4ccc4262c5fe792f29d87e941c4e26c3_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:3660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD50c3c10facb5413ea8f340a7aaf725ac3
SHA1eef27d979bdedb883c769781217a0159ef15939a
SHA2564425768e742149eeac1d29a4ad6960cef2862519491452695d4331e5b2ec604e
SHA51299985fa20028af1e831c6ee210311656b89ea5c60a830fd5c4e49d0a465d21020a0bfea223393d1c8487e9d07799a9c2fc1ff0b74c02702b9fe706acc43985aa
-
Filesize
18KB
MD589662d49695409492bb2d7584e5db26f
SHA1427552bd0f5a664b7431ec735cd10e0f0a1f6e20
SHA256514c430d6a6a1f14b298eee3eab9ad2762f773379f7bde849b88dcf83b7fd4d3
SHA5128e9c61c53aaba1b36f5ee8038004af756e0cf8c41ef23f5d8d0bd9770960a0cf408cc2b3772c1f22e6ccc4c32875dd7abfbaab3de09303a770eb83647f3ff60d