Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 15:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe
-
Size
42KB
-
MD5
c8b54b9a5696cba9aa572605b7be69f5
-
SHA1
aa0c189906106289b178db272c5db057883bbc8f
-
SHA256
679c9c7e336690ac6c011efc3b81619b0bbadbe3c6c66aa85c25f7bc6100f3b6
-
SHA512
094b027b5731dc15f567fa968c2a8c22cd2abd97cfed17dd2e2bc091e9629a439f75a9745557ec6f4f5cf4a31fcf85f462a952648e5b85e87f3fee2e57ec38ba
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5aFr7YOzzb5:V6QFElP6n+gMQMOtEvwDpjyaYaFAY
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x00030000000227e7-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x00030000000227e7-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2988 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5104 wrote to memory of 2988 5104 2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe 98 PID 5104 wrote to memory of 2988 5104 2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe 98 PID 5104 wrote to memory of 2988 5104 2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-14_c8b54b9a5696cba9aa572605b7be69f5_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1032 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:81⤵PID:2264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5cb6468a4251157f3f0b4273ac32dcc02
SHA16bc3779c616bf37d5d7d0b81794531bee804e712
SHA256ef34f4d838e3d8192307f8111af1f1bff9d1b77b2276c51d32f2166f46ea0fd8
SHA5120a8497453e40c000dee82c8dcf11a25c15dff3e83ad0444c471b4db766407c6f9787625277a1f32d55ba896e9a26596902ed31bd3aca112252ec30d43d1feec2