Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_ac4f14f7a988d9c3ea642eec08dbab9e_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_ac4f14f7a988d9c3ea642eec08dbab9e_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-12_ac4f14f7a988d9c3ea642eec08dbab9e_cryptolocker.exe
-
Size
51KB
-
MD5
ac4f14f7a988d9c3ea642eec08dbab9e
-
SHA1
4fd790c86155b372333f4f1d2cdd82a59a919e45
-
SHA256
95c5df28ba67d1c7a8d8dbb8dbb022b69c1b95f31ea74f8568870ccdad4f883d
-
SHA512
68a943642482fcfcd457e764875bf3227fe924a5d2869dc792d10457e3282235723a8aeccc91949f2131b9c5a8e44aca710c08200b6dd583e7a51202bb3a00f7
-
SSDEEP
768:79inqyNR/QtOOtEvwDpjBK/rJ+Nw8qn8pKIR9p:79mqyNhQMOtEvwDpjBxe8TpXRr
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral2/memory/4172-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x00070000000231f5-13.dat CryptoLocker_rule2 behavioral2/memory/4172-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral2/memory/4708-18-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral2/memory/4172-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral2/files/0x00070000000231f5-13.dat CryptoLocker_set1 behavioral2/memory/4172-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral2/memory/4708-18-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 2024-02-12_ac4f14f7a988d9c3ea642eec08dbab9e_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4708 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4172 wrote to memory of 4708 4172 2024-02-12_ac4f14f7a988d9c3ea642eec08dbab9e_cryptolocker.exe 83 PID 4172 wrote to memory of 4708 4172 2024-02-12_ac4f14f7a988d9c3ea642eec08dbab9e_cryptolocker.exe 83 PID 4172 wrote to memory of 4708 4172 2024-02-12_ac4f14f7a988d9c3ea642eec08dbab9e_cryptolocker.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_ac4f14f7a988d9c3ea642eec08dbab9e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_ac4f14f7a988d9c3ea642eec08dbab9e_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5cb7129f7fae294796af696d5a68eb8c3
SHA119624fa240dbe1ab777c71d8ada753047e4d9395
SHA256da0d9e79243aa81a3cab638ec7cb760f1bca407d94b58271d1a9ec1ab89ad9fa
SHA512c41e2811cc5276f325c60e572a9b716271bf6066e418001663c99c8a1e4709994c7a1cd7865bde44ceefed3111f57655e0ced3651341445f042238c8895e33f3