Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 23:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-26_4d4e7044716e2ac47e0e75b14445d02a_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-26_4d4e7044716e2ac47e0e75b14445d02a_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-26_4d4e7044716e2ac47e0e75b14445d02a_cryptolocker.exe
-
Size
74KB
-
MD5
4d4e7044716e2ac47e0e75b14445d02a
-
SHA1
c38cb3abfb1a98b15ddf2cbc324338c7cda4ce18
-
SHA256
43610cd9d3668991734e07da2801f68a708a2cbcc3e37b65a25ef9630abd7463
-
SHA512
e2096b78b3168e7f9739a2c0c4a079027d360df1d708baf32e8227d35d01485a9b013c8c04e14c347bb02e01e64726f71f320e168e3c5ce8974a9018b98f31e1
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1sd:X6a+SOtEvwDpjBZYvQd2y
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x00030000000227e7-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x00030000000227e7-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2024-03-26_4d4e7044716e2ac47e0e75b14445d02a_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 684 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 456 wrote to memory of 684 456 2024-03-26_4d4e7044716e2ac47e0e75b14445d02a_cryptolocker.exe 98 PID 456 wrote to memory of 684 456 2024-03-26_4d4e7044716e2ac47e0e75b14445d02a_cryptolocker.exe 98 PID 456 wrote to memory of 684 456 2024-03-26_4d4e7044716e2ac47e0e75b14445d02a_cryptolocker.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-26_4d4e7044716e2ac47e0e75b14445d02a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-26_4d4e7044716e2ac47e0e75b14445d02a_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:81⤵PID:4848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD59502ab9a16e6713693f24e1d3a3c48e1
SHA1fcbb60ff294d0dbf0911f62da364e37ce4e99931
SHA256ec0668f8e6995a8ecf3ae7a9254b836717c96d1c6c5ec4aa737bb34bcf0027c6
SHA512bc7ee35d07312268771b983444ba479aeac505090abd6267083bfec288df16ae98cb171a4977b1442a974315609d58a3ade5c47bad135638e3c700b2f7e74d14