Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 16:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-13_c8c4a515d630d43439d78991dab6558f_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-13_c8c4a515d630d43439d78991dab6558f_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-13_c8c4a515d630d43439d78991dab6558f_cryptolocker.exe
-
Size
55KB
-
MD5
c8c4a515d630d43439d78991dab6558f
-
SHA1
bc39053378558794c348248a114889cdeda6165d
-
SHA256
33de595df2bddc0070a42f082ed3750ef60670bdea472abd3a9fcc94cd99a967
-
SHA512
73b6923b098fbfc053ee0a95d28c47307a154699dcc58708ccc558c7f2791a907dfcce1f846778c3f8c7331d3ddfa282140f4f2c4756be9692f25bb89dc050a9
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/BtOOtEvwDpjBVaD3E09vaTiSfQaV2LJbP:X6QFElP6n+gJBMOtEvwDpjBtE1yILJD
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023200-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023200-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation 2024-03-13_c8c4a515d630d43439d78991dab6558f_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4968 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2864 wrote to memory of 4968 2864 2024-03-13_c8c4a515d630d43439d78991dab6558f_cryptolocker.exe 90 PID 2864 wrote to memory of 4968 2864 2024-03-13_c8c4a515d630d43439d78991dab6558f_cryptolocker.exe 90 PID 2864 wrote to memory of 4968 2864 2024-03-13_c8c4a515d630d43439d78991dab6558f_cryptolocker.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-13_c8c4a515d630d43439d78991dab6558f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-13_c8c4a515d630d43439d78991dab6558f_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD578bc58fe1690bc15dcfa0b7a31933c7b
SHA1fc6b06f3c90e34ab961da5b5d1f4027fe879829a
SHA256b9c79e291c9f109a94858f026915e8c39c75551b15d9994530a05512afa81c90
SHA51247d9d87af11d599fa51201a0ddbef4ab4f71e619e64038235962736d64ff221d72f3180d3e95544dc25ea05b11326dd8a4963579487cb263c0429b7f276a0363