Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2024 10:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-18_b6eb6111d5adc67ede527ff85e7bb23b_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-18_b6eb6111d5adc67ede527ff85e7bb23b_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-18_b6eb6111d5adc67ede527ff85e7bb23b_cryptolocker.exe
-
Size
37KB
-
MD5
b6eb6111d5adc67ede527ff85e7bb23b
-
SHA1
3174799ade736764fc5029f3b378d3a400d785c5
-
SHA256
ec5b02d9070232ec4df8d7d40882f023d25c5a435f96c4d5cd5e03c11966073f
-
SHA512
a9b95f5bacf151bd443681bf2dd78cbb6bf19a1e66bc7d38859e218752d6b5e5ed968eb0a06618600bb5a43a4bb060602590e98ba1ba16a49f06683cab20e486
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5axZ:V6QFElP6n+gMQMOtEvwDpjyaYa/
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x00070000000231f9-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x00070000000231f9-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 2024-02-18_b6eb6111d5adc67ede527ff85e7bb23b_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3732 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4836 wrote to memory of 3732 4836 2024-02-18_b6eb6111d5adc67ede527ff85e7bb23b_cryptolocker.exe 83 PID 4836 wrote to memory of 3732 4836 2024-02-18_b6eb6111d5adc67ede527ff85e7bb23b_cryptolocker.exe 83 PID 4836 wrote to memory of 3732 4836 2024-02-18_b6eb6111d5adc67ede527ff85e7bb23b_cryptolocker.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-18_b6eb6111d5adc67ede527ff85e7bb23b_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-18_b6eb6111d5adc67ede527ff85e7bb23b_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5de6e2d8845f67041f5358e55440b653b
SHA1ea0f1343efeea5a23c162cce01994666407cc122
SHA2567c33560ce9d7583d93ef6582a6ecc542eae1660563ea495f06f47d18351862b7
SHA5125552c70b21c10c02801eab96d0de28654ec18e5d05fb11a7391e9810fe70d0bfa5a555dfc35c1c4d14096961b4a9776a5a3998e34955a484eccfcbcbbd8855da