Analysis
-
max time kernel
149s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_f7d008d21e8e7c61b3be26723532381b_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_f7d008d21e8e7c61b3be26723532381b_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-10_f7d008d21e8e7c61b3be26723532381b_cryptolocker.exe
-
Size
30KB
-
MD5
f7d008d21e8e7c61b3be26723532381b
-
SHA1
6f0813c1bb901ac103c6b7dc7f3da877ca3f25b5
-
SHA256
c7ca9c3c72d6b05fbf3a19ca0688d2597c0e890426d4c6a4be03f804e59511fd
-
SHA512
bd0b266ad507e1c8799b391f43b3cc7ceabd7e133c03a63534125118592c227747b064c7b683794e814043906455165a19ef6bf76033f401c7c79f2d8fcdb12d
-
SSDEEP
768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIO/xNw0LuE:q0zizzOSxMOtEvwDpj/arzN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 2024-01-10_f7d008d21e8e7c61b3be26723532381b_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3608 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1200 wrote to memory of 3608 1200 2024-01-10_f7d008d21e8e7c61b3be26723532381b_cryptolocker.exe 18 PID 1200 wrote to memory of 3608 1200 2024-01-10_f7d008d21e8e7c61b3be26723532381b_cryptolocker.exe 18 PID 1200 wrote to memory of 3608 1200 2024-01-10_f7d008d21e8e7c61b3be26723532381b_cryptolocker.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_f7d008d21e8e7c61b3be26723532381b_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_f7d008d21e8e7c61b3be26723532381b_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD56cd21ed9de8bbe4fea30d0d19c214120
SHA1fc568951ed4896d8919cbb62abd9f79888372854
SHA2565b8d7549a75f8e92bba073e710f8ffae2608564a304088820b633bb5d623ec15
SHA5126e3e1e2c545a8a54f5b404698445191ac14a0e7025c88aa3dc32516e73ec66c377d486ba376c58eb29fae5785ce75ecff980a3ecb53a18c65b897c0400f9c1ee