Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 09:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_ea0e1999466a00da2216a380c360c51a_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_ea0e1999466a00da2216a380c360c51a_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-12_ea0e1999466a00da2216a380c360c51a_cryptolocker.exe
-
Size
58KB
-
MD5
ea0e1999466a00da2216a380c360c51a
-
SHA1
aa5b3c3bb45646b2c50c8c7ac42b2a6012b76e9b
-
SHA256
f1634a2ef6694bab4b76a02fef5c3e3c224419240cdf0314b4388c395304c8f6
-
SHA512
ee805368e9ec07a55e5683f26b7a503cc4a3f31db06ed80e482b7ed0690a64b7199204efd7816ceddd716cb76225f8588334182a723b81d97d9d4de37cb59d94
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjyaLccVCbt7gY:V6a+pOtEvwDpjvA
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000700000002320c-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x000700000002320c-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 2024-02-12_ea0e1999466a00da2216a380c360c51a_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3956 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4344 wrote to memory of 3956 4344 2024-02-12_ea0e1999466a00da2216a380c360c51a_cryptolocker.exe 84 PID 4344 wrote to memory of 3956 4344 2024-02-12_ea0e1999466a00da2216a380c360c51a_cryptolocker.exe 84 PID 4344 wrote to memory of 3956 4344 2024-02-12_ea0e1999466a00da2216a380c360c51a_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_ea0e1999466a00da2216a380c360c51a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_ea0e1999466a00da2216a380c360c51a_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD50db04f9298b5f4bab19dc363aeccd693
SHA1ad0523687abe1463040229fd1e241593fcde4b29
SHA256b18d1dc7754fc4639988c20c3064282a28bda2ea50041d2c11e7251cf8622d88
SHA512045226829d68fc232ddb7c9b3d69a7db4320365d3a7d98b794b32f0a97d9ac444c89bf837f147eb345746b3c60f491b24d8503e112e2ca11c158f0ecfa4f26a1