Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 11:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-08_2c92432e87149c5d6a35e7d7bdfa52a9_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-08_2c92432e87149c5d6a35e7d7bdfa52a9_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-08_2c92432e87149c5d6a35e7d7bdfa52a9_cryptolocker.exe
-
Size
133KB
-
MD5
2c92432e87149c5d6a35e7d7bdfa52a9
-
SHA1
b8dbb5faaf599eb342ee8dfd5871052bff33683b
-
SHA256
1c27769e0cf4587b401091405b58fd7589099abc6a1e5780a5c3a99531806cf8
-
SHA512
2d7b7e1920221780a74fec8608e315435bd79b52ac0d9771bca5bfbf6c48f1f05fd65e9c2a8c195fd1c354167e6fcc082319ff413bab52445718b3a929a4db7b
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbxGYQbxGYQblPgV:V6a+pOtEvwDpjt22c
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023229-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023229-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation 2024-04-08_2c92432e87149c5d6a35e7d7bdfa52a9_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2384 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4684 wrote to memory of 2384 4684 2024-04-08_2c92432e87149c5d6a35e7d7bdfa52a9_cryptolocker.exe 88 PID 4684 wrote to memory of 2384 4684 2024-04-08_2c92432e87149c5d6a35e7d7bdfa52a9_cryptolocker.exe 88 PID 4684 wrote to memory of 2384 4684 2024-04-08_2c92432e87149c5d6a35e7d7bdfa52a9_cryptolocker.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-08_2c92432e87149c5d6a35e7d7bdfa52a9_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-08_2c92432e87149c5d6a35e7d7bdfa52a9_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD5bb9ddcd7a2838dcba2d367320826ae25
SHA17351b83d6bfbbaa7053dd58e1585aeb726b0658e
SHA2568b6cd915e05e6fd4816c12feef94eec8f7954d11ad03d5b5e40f7f7df53fe699
SHA512923e6b72e6f6a6b81aec743f909e3b24ca534cfed603b39df58ddc0091415162c9d7cb86f4629cac60da5ac180f03b60f3ca0d822e7bf2a442a8c71305678f31