Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 22:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_be809fb40580b22608886afbf98db1ac_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-03-12_be809fb40580b22608886afbf98db1ac_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-12_be809fb40580b22608886afbf98db1ac_cryptolocker.exe
-
Size
130KB
-
MD5
be809fb40580b22608886afbf98db1ac
-
SHA1
f2b3c696eafbaeb21b5d900ec4dc4fc05ec27ab8
-
SHA256
9e60a1dc5467668516c0e354727d17365c00b3579a7b1ee53f9699733ba766d1
-
SHA512
380477138018cc226fe2c753af7125fd09c65882be823e2ecbe330386bc6917a82ae820a53016cf79950c2c28ab1518537a6c8325083a3aa62eb95d73dafc06f
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNgp699GNtL1eqf4:V6a+pOtEvwDpjtzl
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000700000001e59e-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x000700000001e59e-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation 2024-03-12_be809fb40580b22608886afbf98db1ac_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4212 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4944 wrote to memory of 4212 4944 2024-03-12_be809fb40580b22608886afbf98db1ac_cryptolocker.exe 88 PID 4944 wrote to memory of 4212 4944 2024-03-12_be809fb40580b22608886afbf98db1ac_cryptolocker.exe 88 PID 4944 wrote to memory of 4212 4944 2024-03-12_be809fb40580b22608886afbf98db1ac_cryptolocker.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-12_be809fb40580b22608886afbf98db1ac_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-12_be809fb40580b22608886afbf98db1ac_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD5edaa30c74a6646d56c4076affcdb983d
SHA14590e10a9a123968b737a5451b258ae60bdc3507
SHA25690b8fa8d23158a4904bc9cec77158ee7e17b8283036984a5aa5a0d12a5eafd64
SHA512cb7f3486d48f4a45dce87ce76a5c27ddd3540cc4fd8733d97f7c5bc683bb5709d46eb71b13db1c25819982d8fca693ba2849b92e6929f4c343dac76bc90c8246