Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-08_841b3667fe06fb07eb781e3e6050978e_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-08_841b3667fe06fb07eb781e3e6050978e_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-08_841b3667fe06fb07eb781e3e6050978e_cryptolocker.exe
-
Size
61KB
-
MD5
841b3667fe06fb07eb781e3e6050978e
-
SHA1
e3b503b82d58cc95ab39ebfd7bdd8eafb1685f9a
-
SHA256
f642c7426584dfd5312a45489eca2e942f1c9ee133da281b7eefc0a4cc1533c3
-
SHA512
f03b60fe36af83044030c3feb2011cbd689ecb5b23897d6731a4a8b8087ff8d8fb29781a7a5f3a90a9b087e7c0afd2cce2bfbe24b27cca2057eda62cac8d0619
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBccD2RuoNmuBLZ/xblzP:X6a+SOtEvwDpjBrOT
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000b00000002320a-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x000b00000002320a-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation 2024-03-08_841b3667fe06fb07eb781e3e6050978e_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2548 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3232 wrote to memory of 2548 3232 2024-03-08_841b3667fe06fb07eb781e3e6050978e_cryptolocker.exe 90 PID 3232 wrote to memory of 2548 3232 2024-03-08_841b3667fe06fb07eb781e3e6050978e_cryptolocker.exe 90 PID 3232 wrote to memory of 2548 3232 2024-03-08_841b3667fe06fb07eb781e3e6050978e_cryptolocker.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-08_841b3667fe06fb07eb781e3e6050978e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-08_841b3667fe06fb07eb781e3e6050978e_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD51a8de2d0e0cc2fd7bc071af83853097b
SHA1151e361ae8a35bedfe80c95da7f2c40a2015d490
SHA2567cc2d1170abccc475881b77577721808e881614fd8b99085aa18775b51c326ae
SHA512fd6b4c3af7712d22dce1acf82f469f3bfe24f3e61f3f70d777ee24617fdca9e65511310982d80b11c2f917a9b483e1a568c12c48adeba12f86620df9f3d60957