Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
17/02/2024, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-17_3314a2a02dbac60d99a70ca5163b9bf8_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-17_3314a2a02dbac60d99a70ca5163b9bf8_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-17_3314a2a02dbac60d99a70ca5163b9bf8_cryptolocker.exe
-
Size
36KB
-
MD5
3314a2a02dbac60d99a70ca5163b9bf8
-
SHA1
a8b639596c3d3a5e430cb7255b696fb29424c4bb
-
SHA256
8664d4c10075c3ffc69cb057e068bc8ea5eec4a7cfc6468f34a94acc3de251a1
-
SHA512
1032029a06dd73b4ad99ffba14e2886db9c869fa1dc57ef119298ccb59fe94beb0b0b1ef37dc20bca1be811a8f5411f23753044b551ad99de963328074d16434
-
SSDEEP
768:bxNQIE0eBhkL2Fo1CCwgfjOg1tsJ6zeen7JE5m:bxNrC7kYo1Fxf3s065m
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x00080000000231f9-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 2024-02-17_3314a2a02dbac60d99a70ca5163b9bf8_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2488 pissa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3944 wrote to memory of 2488 3944 2024-02-17_3314a2a02dbac60d99a70ca5163b9bf8_cryptolocker.exe 83 PID 3944 wrote to memory of 2488 3944 2024-02-17_3314a2a02dbac60d99a70ca5163b9bf8_cryptolocker.exe 83 PID 3944 wrote to memory of 2488 3944 2024-02-17_3314a2a02dbac60d99a70ca5163b9bf8_cryptolocker.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-17_3314a2a02dbac60d99a70ca5163b9bf8_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-17_3314a2a02dbac60d99a70ca5163b9bf8_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\pissa.exe"C:\Users\Admin\AppData\Local\Temp\pissa.exe"2⤵
- Executes dropped EXE
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD501308dda96bbda55916d140830ab9dd4
SHA1e236a58c546bf22f2e81f17bc40ac2a4c1f4e421
SHA25618b7af8cb3898c0ff57ba4262e7dd9df33ce43227bae13c32eefa45d68654164
SHA512a35457be9c8654630b10aa0e5ee6c5366a5f92866959a4098b70862dd6ccec7cacd1f4fd0da6574eea14f3525a4ab3099813e171a1f51e0a8f73747e01934abf