Analysis
-
max time kernel
160s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-10_947620aacb9b7757959279fd8f24361d_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-10_947620aacb9b7757959279fd8f24361d_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-10_947620aacb9b7757959279fd8f24361d_cryptolocker.exe
-
Size
72KB
-
MD5
947620aacb9b7757959279fd8f24361d
-
SHA1
5f138571a74cea3f0bb9a9e3d8918d7ed8465969
-
SHA256
b0fc893626855e40abafd8ba1f7c7e9243ce9818de6bd54dde5f870c8393fe85
-
SHA512
7762ffc9a673db2875f77f5dc441fb6f539b0181c042dbe548af3d04ad9a334336053ab4693d787c779fb3ec414cb4936d754001a7cd70f4442ea3cb9230ca9c
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1gP:X6a+SOtEvwDpjBZYvQd2w
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023229-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023229-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation 2024-03-10_947620aacb9b7757959279fd8f24361d_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2880 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 780 wrote to memory of 2880 780 2024-03-10_947620aacb9b7757959279fd8f24361d_cryptolocker.exe 91 PID 780 wrote to memory of 2880 780 2024-03-10_947620aacb9b7757959279fd8f24361d_cryptolocker.exe 91 PID 780 wrote to memory of 2880 780 2024-03-10_947620aacb9b7757959279fd8f24361d_cryptolocker.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-10_947620aacb9b7757959279fd8f24361d_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-10_947620aacb9b7757959279fd8f24361d_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD562db6611628745209818e910c4e8ec97
SHA109fc11c17bc9d37624e4f693483ce8230326685e
SHA25602d1db4f61d7a67a085522c97862635a8724fad0379109d9ef81aa99f83be341
SHA5125a33b9247085d20409ab37ab820685cf6e5fb08017d8eed9601629ab26f8858cf8f58335d4d150182b47caa42ddc85000212fea807f7c2eddbd99b2acf22f167