Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 01:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-09_460356ac55449e6f4c3c2d0059c42c90_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-09_460356ac55449e6f4c3c2d0059c42c90_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-09_460356ac55449e6f4c3c2d0059c42c90_cryptolocker.exe
-
Size
50KB
-
MD5
460356ac55449e6f4c3c2d0059c42c90
-
SHA1
3232616a5cf3a0b15bdfcfb3ed7d2af4e229a220
-
SHA256
0b29506e188d524b2d287d36ef79e59a924420b2471ee9ed070f555e4ce0d980
-
SHA512
c36cd0be0a089db28f349bbdd400a57a822781bd247600d246e05717124d47fa41d04ab3c65cd2ee339875aadeda6c8e46d02ecf8189513b4797279926df1ce5
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu55id3AMWZWh:X6QFElP6n+gJQMOtEvwDpjB0GIWiWLU
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023250-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023250-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation 2024-04-09_460356ac55449e6f4c3c2d0059c42c90_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2136 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2136 2828 2024-04-09_460356ac55449e6f4c3c2d0059c42c90_cryptolocker.exe 88 PID 2828 wrote to memory of 2136 2828 2024-04-09_460356ac55449e6f4c3c2d0059c42c90_cryptolocker.exe 88 PID 2828 wrote to memory of 2136 2828 2024-04-09_460356ac55449e6f4c3c2d0059c42c90_cryptolocker.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-09_460356ac55449e6f4c3c2d0059c42c90_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-09_460356ac55449e6f4c3c2d0059c42c90_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD57e0cea2fb018f52aa8b9de67fef3cf0c
SHA13d1520c13c24153b86aba36e6e8b377ba8335c00
SHA256084f48d5bdc351545efc468d209b504d2743d55d49a9dca9ddc80a1ee7c7265d
SHA51294258168f1b481c4ec6bbc926b6f88f9972e57ec477c94c5634a2196ae53805312e237bb890d6082eef3c1bf701d39cd7ab92926f06378f40be1bc52a4e8c488