Analysis
-
max time kernel
156s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 05:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_913f3f792ccc3bb7907349cd5eb8eee9_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_913f3f792ccc3bb7907349cd5eb8eee9_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-09_913f3f792ccc3bb7907349cd5eb8eee9_cryptolocker.exe
-
Size
49KB
-
MD5
913f3f792ccc3bb7907349cd5eb8eee9
-
SHA1
6feeed46cdc0588d78bda1c28f797880dbd59991
-
SHA256
f23a291c75ea0cd4ae6a17217e0562838c9ce2bbf18949fc091760c91b477a1f
-
SHA512
a5b1b0933bc40b74006e7e0baca976f2e590b4f9fe1d437ccad68355d7f5091e860ee24af41b26fcb9447c7a794929e1e70155f2956f95badb147769c825fce0
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/BtOOtEvwDpjBVaD3E09vaTCFWpzF:X6QFElP6n+gJBMOtEvwDpjBtEc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 2024-01-09_913f3f792ccc3bb7907349cd5eb8eee9_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3760 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 376 wrote to memory of 3760 376 2024-01-09_913f3f792ccc3bb7907349cd5eb8eee9_cryptolocker.exe 94 PID 376 wrote to memory of 3760 376 2024-01-09_913f3f792ccc3bb7907349cd5eb8eee9_cryptolocker.exe 94 PID 376 wrote to memory of 3760 376 2024-01-09_913f3f792ccc3bb7907349cd5eb8eee9_cryptolocker.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-09_913f3f792ccc3bb7907349cd5eb8eee9_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-09_913f3f792ccc3bb7907349cd5eb8eee9_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD575e671afcd0a5e25caa746f83f6f1b3e
SHA1eea6b104dc629f2e4eb5309eaa55ef33cd4d067c
SHA25631e67636a34fd128f81fab887f45712e0e9dc9ede00c1256a2edbdcc2261f3ea
SHA512d0c432f6dcb59de48b310124947dc9fe8b13678a9dab3f49b076147ea2ace3f507893efe11561b55cb427260e0aedca9a561916fd00ca165ead2279f37d7afd2