Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_741235b385975d62a951185c1358f8d1_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-16_741235b385975d62a951185c1358f8d1_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-16_741235b385975d62a951185c1358f8d1_cryptolocker.exe
-
Size
49KB
-
MD5
741235b385975d62a951185c1358f8d1
-
SHA1
24e3f05218554b4e65013b96521c6b4d93bdfab0
-
SHA256
2e9f99cae9c23f42e194a0c33a1471f74250eef70cb6edde88a8410ee35efee5
-
SHA512
5a92a98e649c229e1b5685a0404e141a63a613aa7d6903a92b7ef69b7e605286ce2450a35e93ea32ba9acd7e1eaa577741763d401a130dc3cbd44c034dc60df6
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu55id3AMWZj:X6QFElP6n+gJQMOtEvwDpjB0GIWiWLt
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000300000001e97c-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x000300000001e97c-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation 2024-04-16_741235b385975d62a951185c1358f8d1_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2332 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 460 wrote to memory of 2332 460 2024-04-16_741235b385975d62a951185c1358f8d1_cryptolocker.exe 84 PID 460 wrote to memory of 2332 460 2024-04-16_741235b385975d62a951185c1358f8d1_cryptolocker.exe 84 PID 460 wrote to memory of 2332 460 2024-04-16_741235b385975d62a951185c1358f8d1_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_741235b385975d62a951185c1358f8d1_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_741235b385975d62a951185c1358f8d1_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD598e355cbdf58e035460b2b524ef75e0a
SHA1b6fcc772afd156853e75cb10ef3957f975be2966
SHA256099a56844123d9a99f4305281698e15b07d9c7679809e30967fd38a7bddfb2b1
SHA51277873189c86e357326c07637a6b2fca6f62a874f0da310d0c89bafe497006265a53e3e38238217a4398c4d29714704e4fb2fae47da2118fa76d04803f77f9cf1