Analysis
-
max time kernel
0s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 06:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_8f20e2307bf9e5681ceeb99de47b95ba_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-11_8f20e2307bf9e5681ceeb99de47b95ba_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-11_8f20e2307bf9e5681ceeb99de47b95ba_cryptolocker.exe
-
Size
45KB
-
MD5
8f20e2307bf9e5681ceeb99de47b95ba
-
SHA1
273e855550a1b17b0604406b02e92d83f1e6a12d
-
SHA256
2b6655ca31c5df6a2f39e2bb5eac19fe9204dafd3985cf76a47d3bb8809bd9a6
-
SHA512
f56852482d6e8afcf8b4cb1e69714a2f37ee197793b9e32c3d80015de96c02e319fe3f98e31aeeb16e647b9f216d04eaf19a404ce51a8f8620ce8936d1764393
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLaHaMMm2X30E3c:V6QFElP6n+gMQMOtEvwDpjyaHaX4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 2024-01-11_8f20e2307bf9e5681ceeb99de47b95ba_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4592 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3188 wrote to memory of 4592 3188 2024-01-11_8f20e2307bf9e5681ceeb99de47b95ba_cryptolocker.exe 19 PID 3188 wrote to memory of 4592 3188 2024-01-11_8f20e2307bf9e5681ceeb99de47b95ba_cryptolocker.exe 19 PID 3188 wrote to memory of 4592 3188 2024-01-11_8f20e2307bf9e5681ceeb99de47b95ba_cryptolocker.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_8f20e2307bf9e5681ceeb99de47b95ba_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_8f20e2307bf9e5681ceeb99de47b95ba_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD594250b5576ba263c632f042fbbe747f8
SHA1577350137acc7e2ba5f10e2c9f7ac24afaa06ad5
SHA25625e9b5d9a1733e12f02b5f63d16d7fca1ba8dd88190d181e4458b1d73039fadb
SHA512c60fdfb47fc0af6753e8aa6cfb150bc1d1f9028adbb5ea72c422642ee222791284f7ee9303044a35c40ff02786e564ce0e2119a51a106084c55c5f3b71a32277