Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-18_286f70e33b63a68e67a085f7865785d7_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-18_286f70e33b63a68e67a085f7865785d7_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-18_286f70e33b63a68e67a085f7865785d7_cryptolocker.exe
-
Size
35KB
-
MD5
286f70e33b63a68e67a085f7865785d7
-
SHA1
b358ce8b06897c9bb739701d38fd3d944c35bc18
-
SHA256
7188fea4abefc87049710cec7aa4fe1264dabddc8a2f4fe87377719f3b2327d1
-
SHA512
164ad0657b5b5b8b2e8a78f47ad29d8095e6098d06ead49d7b0cd69e82925a3d0a98e7e306c160795f318b4b14b22d0e676bbf7c255354c7eea08581f590f9f6
-
SSDEEP
768:bxNQIE0eBhkL2Fo1CCwgfjOg1tsJ6zeen7JEgx3a:bxNrC7kYo1Fxf3s06gY
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x00080000000231f7-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 2024-01-18_286f70e33b63a68e67a085f7865785d7_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 464 pissa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5048 wrote to memory of 464 5048 2024-01-18_286f70e33b63a68e67a085f7865785d7_cryptolocker.exe 88 PID 5048 wrote to memory of 464 5048 2024-01-18_286f70e33b63a68e67a085f7865785d7_cryptolocker.exe 88 PID 5048 wrote to memory of 464 5048 2024-01-18_286f70e33b63a68e67a085f7865785d7_cryptolocker.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-18_286f70e33b63a68e67a085f7865785d7_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-18_286f70e33b63a68e67a085f7865785d7_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\pissa.exe"C:\Users\Admin\AppData\Local\Temp\pissa.exe"2⤵
- Executes dropped EXE
PID:464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5f0a0d96c2269e90a414203e4b99e54c3
SHA1dc7ffd7013d9eff58645cf2ab4432d7b2c1a9887
SHA256b36b5670d25515211714973d7831c19ac6f46a9e2951d4f3caad0863a4ee4d74
SHA512032d7cc90edb12b4ac1db17bd214fff7d178a52f590f8e309d86e4b8923e3d9b1367fa295d72b6f6793258c189fa55244db5812d02b06eb5e1da39306bcfaebf