Analysis
-
max time kernel
158s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-26_4892902e1b9f5a32bfbaac2ee17354ab_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-26_4892902e1b9f5a32bfbaac2ee17354ab_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-26_4892902e1b9f5a32bfbaac2ee17354ab_cryptolocker.exe
-
Size
131KB
-
MD5
4892902e1b9f5a32bfbaac2ee17354ab
-
SHA1
b45aaa21c0d1796170a5f5b1c74d59116ad95fe1
-
SHA256
00f5f0857a752e282d27abafcf7cf061fc6a8add36a242a27e70cd83be0f2f23
-
SHA512
67c9d4b0846683bab215ef21267d3aa507d1a15c58aaa7bd9dfef58e6dca33704778a5c389187cf6ba3c9d94ce0fbf3c5df8677ea71ceea053074effb908f793
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNgp699GNtL1eaI:V6a+pOtEvwDpjtzr
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023235-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023235-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation 2024-03-26_4892902e1b9f5a32bfbaac2ee17354ab_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2588 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4256 wrote to memory of 2588 4256 2024-03-26_4892902e1b9f5a32bfbaac2ee17354ab_cryptolocker.exe 91 PID 4256 wrote to memory of 2588 4256 2024-03-26_4892902e1b9f5a32bfbaac2ee17354ab_cryptolocker.exe 91 PID 4256 wrote to memory of 2588 4256 2024-03-26_4892902e1b9f5a32bfbaac2ee17354ab_cryptolocker.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-26_4892902e1b9f5a32bfbaac2ee17354ab_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-26_4892902e1b9f5a32bfbaac2ee17354ab_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD5df2fa9a69f1839bcb38a3bb2cdb0571f
SHA192a5c5d86ed472b8e01a3b6fd0f92bea7dd7064f
SHA256872feb048c44e35d5cf6748c74ed338fbc8007bcc8d24684ee30ffa1b1ab5c9e
SHA51232e6e2f22f32a3cb3681764f0c44207f71f007ffda3032ec24aeb503ca34a2bc4afd4937b6f55ef29fb4979efaff54e62627a616fd598b3d61f06a02e255c894