Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-06_6f6a53bbe62bfd90372a386deef3a0a7_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-06_6f6a53bbe62bfd90372a386deef3a0a7_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-06_6f6a53bbe62bfd90372a386deef3a0a7_cryptolocker.exe
-
Size
38KB
-
MD5
6f6a53bbe62bfd90372a386deef3a0a7
-
SHA1
7be253ef688571026aab70f3ba4f7a3a310895af
-
SHA256
e9535a6fc2d88256f3ca886694cffd1c52a87fa8382d8e55c364f97f94aa1e7e
-
SHA512
27fec1357ad08ed5274d242ec55e2683da460608e0558f35edcae8afd58276dfdea45f5859bb9f8d0bfa1256e8762f795d4843ced9172718c35b1601df22f1eb
-
SSDEEP
768:wHGGaSawqnwjRQ6ESlmFOsPoOdQtOOtEvwDpjm6WaJIOc+UPPEkLHwp:YGzl5wjRQBBOsP1QMOtEvwDpjgarrkLC
Malware Config
Signatures
-
Detection of CryptoLocker Variants 3 IoCs
resource yara_rule behavioral2/memory/2312-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x000700000001ebc7-13.dat CryptoLocker_rule2 behavioral2/memory/2312-17-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 3 IoCs
resource yara_rule behavioral2/memory/2312-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral2/files/0x000700000001ebc7-13.dat CryptoLocker_set1 behavioral2/memory/2312-17-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation 2024-03-06_6f6a53bbe62bfd90372a386deef3a0a7_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 5044 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2312 wrote to memory of 5044 2312 2024-03-06_6f6a53bbe62bfd90372a386deef3a0a7_cryptolocker.exe 88 PID 2312 wrote to memory of 5044 2312 2024-03-06_6f6a53bbe62bfd90372a386deef3a0a7_cryptolocker.exe 88 PID 2312 wrote to memory of 5044 2312 2024-03-06_6f6a53bbe62bfd90372a386deef3a0a7_cryptolocker.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-06_6f6a53bbe62bfd90372a386deef3a0a7_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-06_6f6a53bbe62bfd90372a386deef3a0a7_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:5044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD55c1786b5715121ecd703e62a057874d1
SHA108081d911d1ae73d998ac3dedfb04ef9e93251d2
SHA2569058ef8b98d549ba5572e8007767cf6850cb9f53231f5f90981017aad30db211
SHA5121b69239e44657f276125db9d993f29fbe167ba75825dc611bc172948d0dc1f5280d7271985648db08043e7dbc1fff453588b08dd77a09fc41a1c554b7683701a