Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2024 08:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-11_d825ee1f5ff96a0ae17360ceff1035f7_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-11_d825ee1f5ff96a0ae17360ceff1035f7_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-11_d825ee1f5ff96a0ae17360ceff1035f7_cryptolocker.exe
-
Size
106KB
-
MD5
d825ee1f5ff96a0ae17360ceff1035f7
-
SHA1
03a2e66a67b600723bd93bb2743fcc6f298baa2f
-
SHA256
a0d9d0fc5288597e3cf64673dc53d6577f6056b2f822c1324931b509ec9c8654
-
SHA512
53df2835c126a963fbce4048b82c3f90b603d329ecc0a0f6cc9f58db443d6ee5bb1e0fcd9e12bc58bd0c1781d6d72917c0632fd0a89047ef8747f0699643dbe6
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNgpQbCJh5:V6a+pOtEvwDpjtzw
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x00080000000231fe-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x00080000000231fe-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation 2024-04-11_d825ee1f5ff96a0ae17360ceff1035f7_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3828 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 872 wrote to memory of 3828 872 2024-04-11_d825ee1f5ff96a0ae17360ceff1035f7_cryptolocker.exe 84 PID 872 wrote to memory of 3828 872 2024-04-11_d825ee1f5ff96a0ae17360ceff1035f7_cryptolocker.exe 84 PID 872 wrote to memory of 3828 872 2024-04-11_d825ee1f5ff96a0ae17360ceff1035f7_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d825ee1f5ff96a0ae17360ceff1035f7_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-11_d825ee1f5ff96a0ae17360ceff1035f7_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5ff4e3c271794482429ed938a348fbf86
SHA101a6010a1d69c36d9d272b2f08922f231033fb25
SHA25643a43216dd21bc9f2ae150f44bd988d036d5cfd30c1f524c3b9287d498de33a6
SHA512639d5cf4aaaaf48285c3ab4be1c0bf6389c92268e6c037e1cccfb2a9442ba77fe62713432f246cb858942a12ab2e77fa31d78e4d91b658faf610af3c44127b8c