Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 05:58
Behavioral task
behavioral1
Sample
2024-01-10_f017d04002d0109f574bd031dded5c97_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_f017d04002d0109f574bd031dded5c97_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-10_f017d04002d0109f574bd031dded5c97_cryptolocker.exe
-
Size
116KB
-
MD5
f017d04002d0109f574bd031dded5c97
-
SHA1
a1235462b192030fe8202eeb8e4999b6107fd831
-
SHA256
115a05ca0e2a92548f84ceb73cb4b8f6b2e56a580badef355a46cd82ef78a015
-
SHA512
186d00d40056bfd6c3a55bbe27609b699cc1cb69cc6c828cbdd2bde461b0fa19493051ca1013803eb9c527d41cb0407249f647307c8e64da0521e341e504d0eb
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerar/Q:T6a+rdOOtEvwDpjLzx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 2024-01-10_f017d04002d0109f574bd031dded5c97_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 1952 asih.exe -
resource yara_rule behavioral2/memory/4652-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x000300000001e982-13.dat upx behavioral2/memory/4652-19-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1952-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x000300000001e982-16.dat upx behavioral2/files/0x000300000001e982-15.dat upx behavioral2/memory/1952-27-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4652 wrote to memory of 1952 4652 2024-01-10_f017d04002d0109f574bd031dded5c97_cryptolocker.exe 17 PID 4652 wrote to memory of 1952 4652 2024-01-10_f017d04002d0109f574bd031dded5c97_cryptolocker.exe 17 PID 4652 wrote to memory of 1952 4652 2024-01-10_f017d04002d0109f574bd031dded5c97_cryptolocker.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_f017d04002d0109f574bd031dded5c97_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_f017d04002d0109f574bd031dded5c97_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5552abe609261224a18881afba25296a2
SHA1e4c47d30432cf3c880d8274c8f0325ba3a0adf48
SHA2560858128b146007436fa2964b99f1cd247ecba67ebf69c3a13725e3f52782df32
SHA512b062fbd0d25917e339e7ab192662a7ab2274d311b10ef2df462839caa8f4f61018082874ba41e8a9e1997883a9cd9b481b942e74e41fa12f5355b3502070d46e
-
Filesize
116KB
MD5a4f50ad265d42e886c89e1e78c4d5a73
SHA156cc4ae40b4162dd6ce1653f1f9e98baf5858953
SHA256321d925a3331603e975c3a5bce00dc11dd19e908f6d1418b69a5cbe5d88f43eb
SHA512d0fe05a87d381e7ca8cca498c16c0694fce563239cb48da6d7b73aa585007885fed6a089efb270c2c1e6864993fd296d69a56d62ea397fa5cdb4f7ea0166b9f6
-
Filesize
46KB
MD556aa742f6675de9ce964f98aa6b2a3ac
SHA127eda32a6ebb1a82183e762c83b285c8ad3aecbb
SHA256d5b2c45ff52e8aa7efcd7d01148c4a20724d0e3c916b8f94c59bc1e5ff39da6b
SHA512c4f32e1b6dc1007720664e64f13c336b99b19ea12024a8fffe6c859131cbfedf5d589ccac1a2ef47b28576ad0ce0f16d26d74420e7468196840b0c3f1ca13e8a