Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-25_ec7d595051054a54c210b43ee244a5c4_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-25_ec7d595051054a54c210b43ee244a5c4_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-25_ec7d595051054a54c210b43ee244a5c4_cryptolocker.exe
-
Size
48KB
-
MD5
ec7d595051054a54c210b43ee244a5c4
-
SHA1
55f11a1f81325fa4e4671276f1fc4a70c540767d
-
SHA256
557f869689410e08e9de72b6e7bb5d2a64e383326656ad6d3c2cc03e17398fe6
-
SHA512
547310cf37a1b97b5b88aa0b89a271b7b5e9682d783ce44d789d9a695fdf995329cf45a6b7569fa027c7ef7547d2e0ed3eacaee27b7708d335cf3fbf4edddaf9
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjeJQ7pojakNA:V6a+pOtEvwDpjH
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x00c300000001e848-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x00c300000001e848-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2132103209-3755304320-2959162027-1000\Control Panel\International\Geo\Nation 2024-02-25_ec7d595051054a54c210b43ee244a5c4_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 548 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3724 wrote to memory of 548 3724 2024-02-25_ec7d595051054a54c210b43ee244a5c4_cryptolocker.exe 90 PID 3724 wrote to memory of 548 3724 2024-02-25_ec7d595051054a54c210b43ee244a5c4_cryptolocker.exe 90 PID 3724 wrote to memory of 548 3724 2024-02-25_ec7d595051054a54c210b43ee244a5c4_cryptolocker.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-25_ec7d595051054a54c210b43ee244a5c4_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-25_ec7d595051054a54c210b43ee244a5c4_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD545d27f2643b676c938ae5d5302309e2b
SHA123d217e594a72ba3d6f7e49c1a0e3209a3c9de7a
SHA256de2f63d23ce77534b722d110fc29e4b487688c849d8ea8ed94ed172f4ef93ad9
SHA512be1f87b629fdf3f7b71f23d218f94dc580d02cb2a788031393e8c8c55be358234600e7521e7f9b1609517420b3b83e1944b7869ca0465aad1c3471010f465c24