Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:40
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_e7ce3e59b8de1c6a2ef795c932db91b2_cryptolocker.exe
Resource
win7-20231215-en
General
-
Target
2024-01-25_e7ce3e59b8de1c6a2ef795c932db91b2_cryptolocker.exe
-
Size
59KB
-
MD5
e7ce3e59b8de1c6a2ef795c932db91b2
-
SHA1
317fd58e791517774733798e0ca0530b72c0e5dd
-
SHA256
2de6e94a3b2397740b5024c2cb8f5582592b824cca5a8e63ef7d6644a85b725d
-
SHA512
b076b5b9657fb3efcddf6de459f39a11f30a14547899655fd641f4d4643fa09b3244e980d91557a8518989ce9019189b6a18f9e4f90eff907aefa61d72036679
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBccD2RuoNmuBLZ/xn:X6a+SOtEvwDpjBrOZ
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000900000002313b-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x000900000002313b-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 2024-01-25_e7ce3e59b8de1c6a2ef795c932db91b2_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 468 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3800 wrote to memory of 468 3800 2024-01-25_e7ce3e59b8de1c6a2ef795c932db91b2_cryptolocker.exe 87 PID 3800 wrote to memory of 468 3800 2024-01-25_e7ce3e59b8de1c6a2ef795c932db91b2_cryptolocker.exe 87 PID 3800 wrote to memory of 468 3800 2024-01-25_e7ce3e59b8de1c6a2ef795c932db91b2_cryptolocker.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_e7ce3e59b8de1c6a2ef795c932db91b2_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_e7ce3e59b8de1c6a2ef795c932db91b2_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD500d0896f61905c313b56bb573a4dc8db
SHA1d43ca8df3a98f2a1842e6d2e4f9222c172d650fc
SHA2564fd2ae8afb3069f8e5ed35319f444c359d55f2f69028e44be4b965b1603955f1
SHA5127a5a2f1939adce6fe011f1be69953ae7e3cbbe89300e2712a992c68672c5ce6eaa71201dcd238c11f19c81e9410232766101c89c71acf2a1d902b03cb0203366