Analysis
-
max time kernel
167s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_1b3e6d27aa5faaf6790b38cd352065fe_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-11_1b3e6d27aa5faaf6790b38cd352065fe_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-11_1b3e6d27aa5faaf6790b38cd352065fe_cryptolocker.exe
-
Size
58KB
-
MD5
1b3e6d27aa5faaf6790b38cd352065fe
-
SHA1
03d8a8f9c19a90eb496f7824050c39ee752220d7
-
SHA256
014319e44bfa9194428f7068d65eab73f99f5341093effdf2ff8123f67a4a896
-
SHA512
e431dfad15e481daefa6ca2bfdbb10ebb6ee0569bb608b80c52fbc2bfd2805782d2216cd4253265af59c8934af98721914dca5a432c68934c3538d90522ac515
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLa5VccPt547/Gfx:V6QFElP6n+gMQMOtEvwDpjyaLccVCbmx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 2024-01-11_1b3e6d27aa5faaf6790b38cd352065fe_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2004 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2004 2144 2024-01-11_1b3e6d27aa5faaf6790b38cd352065fe_cryptolocker.exe 91 PID 2144 wrote to memory of 2004 2144 2024-01-11_1b3e6d27aa5faaf6790b38cd352065fe_cryptolocker.exe 91 PID 2144 wrote to memory of 2004 2144 2024-01-11_1b3e6d27aa5faaf6790b38cd352065fe_cryptolocker.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_1b3e6d27aa5faaf6790b38cd352065fe_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_1b3e6d27aa5faaf6790b38cd352065fe_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5ef08f043bd6c11f32ec267eba44e0d04
SHA10b174d58d92fe23925f1cb6f68dc7c02203dce91
SHA25616ac8b18099c7769f9ea766b6ff56f6ca4dd7ce29f6166b23f410ac1c09db273
SHA5121ded273614aa5fe1b0084392f0a7c629717655578e7c78fbe27f4218ed0c29803e084a6bb5800e97ce1dce68807f28822629dc5339530e6f9999e94c4b169642
-
Filesize
58KB
MD5be8194e1226398118b587afd4cc77b55
SHA10924a8c7532f10090e15c34deb0b0502cc0bfd17
SHA2567c3b64ec6632cb5e18dbfc739d5cc5eb32e151c1359d896bb1541fedaf053a67
SHA51203afacc414cac00d60424a4afff8f207362c81433d8b7a66f1134f003e54852eb25f907213b4388512e598ef463a0fce3ab0756e0deb0e64197f01f26532d4ed