Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
17-02-2024 07:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-17_db2e85404fec0cd1cf220b37c9790158_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-17_db2e85404fec0cd1cf220b37c9790158_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-17_db2e85404fec0cd1cf220b37c9790158_cryptolocker.exe
-
Size
74KB
-
MD5
db2e85404fec0cd1cf220b37c9790158
-
SHA1
01cc71ee55884e31cca7db51cc169a60e6e322c1
-
SHA256
2aeb2212966af127ea36c8c7381493fb89725ae90d8d69a0f016ed97c927e7a5
-
SHA512
fbe9283e5c5567d25c1e1bedd54629787b3e6f8513e9e324f6c0d5e0447d7885192c93630b3405f128816c4bb0087f40a7d083a012a3654262450bdff9c202fb
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1co:X6a+SOtEvwDpjBZYvQd2L
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023204-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023204-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 2024-02-17_db2e85404fec0cd1cf220b37c9790158_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4172 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5012 wrote to memory of 4172 5012 2024-02-17_db2e85404fec0cd1cf220b37c9790158_cryptolocker.exe 84 PID 5012 wrote to memory of 4172 5012 2024-02-17_db2e85404fec0cd1cf220b37c9790158_cryptolocker.exe 84 PID 5012 wrote to memory of 4172 5012 2024-02-17_db2e85404fec0cd1cf220b37c9790158_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-17_db2e85404fec0cd1cf220b37c9790158_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-17_db2e85404fec0cd1cf220b37c9790158_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD598bb3f1615a87f8b3b46272108158012
SHA1b327c613c358e116f356a26712c109de70359f46
SHA2564252d18546fe2844574c342fccc44703113f123a42027ae86cd3c03ce724d535
SHA512076a9cf5dd28af15add5e76ed029dd7f641580b77190fb520c0bf289bdb9b5d991336ff7388730fbaa215164c1a92f529e930e8016c03f9ffa72d6fa88bb9a05