Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-03_3d1742fa63a47fdcd9fe643261606a45_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-03_3d1742fa63a47fdcd9fe643261606a45_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-03_3d1742fa63a47fdcd9fe643261606a45_cryptolocker.exe
-
Size
42KB
-
MD5
3d1742fa63a47fdcd9fe643261606a45
-
SHA1
9344c0913f4cf00674a0e0301b78df7113050ea1
-
SHA256
9382d470e51b167b97920361cae7757ca0846b315aad97a04edc531342721d4e
-
SHA512
a4e2ea9f8e7208732144b1fc095c7d119e703576138c7fe34d466509af4da01d990d3f4ee03d98d4f5119017ca19a87fd43fe32de754cd0310fc796813cd9a12
-
SSDEEP
768:bxNQIE0eBhkL2Fo1CCwgfjOg1tsJ6zeen754XcwxbFp1Yvb9w:bxNrC7kYo1Fxf3s05rwxbF7Yvbe
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023242-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 2024-02-03_3d1742fa63a47fdcd9fe643261606a45_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3132 pissa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2532 wrote to memory of 3132 2532 2024-02-03_3d1742fa63a47fdcd9fe643261606a45_cryptolocker.exe 83 PID 2532 wrote to memory of 3132 2532 2024-02-03_3d1742fa63a47fdcd9fe643261606a45_cryptolocker.exe 83 PID 2532 wrote to memory of 3132 2532 2024-02-03_3d1742fa63a47fdcd9fe643261606a45_cryptolocker.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-03_3d1742fa63a47fdcd9fe643261606a45_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-03_3d1742fa63a47fdcd9fe643261606a45_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\pissa.exe"C:\Users\Admin\AppData\Local\Temp\pissa.exe"2⤵
- Executes dropped EXE
PID:3132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5735c239936e9de8681c97124f23caf61
SHA1b54053a9fd3001a1f0c9ac34060a28bf7d1ae656
SHA25661ec603e2719e6fb5951d51a73e93527f49e5132719dd792df8067fda4777abe
SHA51200251aa9f163aef794c4b6b8d4bba2a0934bc8571b4021ebc9971b952abf5453d5a3cb422f7f6245905b6b0b9352340d28cb77094659c891d8a222636e695d73