Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 10:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_4bd112d363fe954a0e9d7fea46d82eda_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-12_4bd112d363fe954a0e9d7fea46d82eda_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-12_4bd112d363fe954a0e9d7fea46d82eda_cryptolocker.exe
-
Size
48KB
-
MD5
4bd112d363fe954a0e9d7fea46d82eda
-
SHA1
2b0226e3d418bee6c2c90b99a6655b0445898dcf
-
SHA256
589810ad7a34900001932972f5e694873e70c60c4895dc0e78bd44da4cb40197
-
SHA512
abd6c6c33d85152ebb866b693d728b9c6593bbf6f7f1a62e5a8712f9afdef9f08f63f2dad89677a3aab8bc98e45a33e5315ccc0760929d09bc2c949398fe8f3b
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3wwsr0JJc:X6QFElP6n+gJQMOtEvwDpjBD/
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000400000001e5eb-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x000400000001e5eb-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation 2024-03-12_4bd112d363fe954a0e9d7fea46d82eda_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 836 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3684 wrote to memory of 836 3684 2024-03-12_4bd112d363fe954a0e9d7fea46d82eda_cryptolocker.exe 88 PID 3684 wrote to memory of 836 3684 2024-03-12_4bd112d363fe954a0e9d7fea46d82eda_cryptolocker.exe 88 PID 3684 wrote to memory of 836 3684 2024-03-12_4bd112d363fe954a0e9d7fea46d82eda_cryptolocker.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-12_4bd112d363fe954a0e9d7fea46d82eda_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-12_4bd112d363fe954a0e9d7fea46d82eda_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5499900799be8c4f6319df8f2e05749a9
SHA17d73e451a28fdc268f5a4a97ce75d3ed66fadf20
SHA256700de88408afffd5763ca63818583ea39f129dc265718399abf2707d72e486a3
SHA512221ad153099cc00758a09fd607dd64125f8028d40dbf84516789687fc8a263a9948378edb54bf9b0f4e25fe2104266e778f5b45b1b5ceb49999637d47ac08cd9