Analysis
-
max time kernel
135s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2024 18:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-02_e169ee57c1ff51548144181344fe44e8_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-02_e169ee57c1ff51548144181344fe44e8_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-02_e169ee57c1ff51548144181344fe44e8_cryptolocker.exe
-
Size
82KB
-
MD5
e169ee57c1ff51548144181344fe44e8
-
SHA1
c6e16b4d3de97a65204fef67571923a186d4bb41
-
SHA256
2b1181107cf764cf88a3d46525c3c84626ce47b372b3c2048c6ad0e68d728fa7
-
SHA512
6f3b475dbe2f6124b1cb011a7cabc2783fa829798b9d0335e3e66ddd8fbaff3bd499040bf5d7b3cecd92f314e246828f210defe232ec68513cbbea866ddde383
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLa5VccPtNw5CS95yFPFHB:V6QFElP6n+gMQMOtEvwDpjyaLccVNld
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000700000002311a-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x000700000002311a-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 2024-02-02_e169ee57c1ff51548144181344fe44e8_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3276 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3976 wrote to memory of 3276 3976 2024-02-02_e169ee57c1ff51548144181344fe44e8_cryptolocker.exe 83 PID 3976 wrote to memory of 3276 3976 2024-02-02_e169ee57c1ff51548144181344fe44e8_cryptolocker.exe 83 PID 3976 wrote to memory of 3276 3976 2024-02-02_e169ee57c1ff51548144181344fe44e8_cryptolocker.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-02_e169ee57c1ff51548144181344fe44e8_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-02_e169ee57c1ff51548144181344fe44e8_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5fe38605d459126677fd3b0c2a0204300
SHA190ff0ddddac352e68a1e0a7993be59ae283c9c83
SHA256941b670ec014a13293396b3bf2ed604c7cfcd1bd64b850fc034b23f5698800bf
SHA512f19d1722270a25b96e76cd33a2192768b0c4257f96b5ecb59cefc706756b02ff69aed46640970802ddaeabf0555134cb4f2d05c80f14bd7b949d0bd9b6b6c145