Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-17_20781810b801d868248bbe674409c936_cryptolocker.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2024-04-17_20781810b801d868248bbe674409c936_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-17_20781810b801d868248bbe674409c936_cryptolocker.exe
-
Size
41KB
-
MD5
20781810b801d868248bbe674409c936
-
SHA1
91864ac90c115483971b3aa1a26a988fc87e14b6
-
SHA256
95c4aebc4969c146663ce31314f08026e1a0aa34b9b20d96b77e346408640cff
-
SHA512
944ba70d2608257e98743ce0ea04ef635535aef8629f8fb2a095d0c71183f1e297fd18eb32941a602a61643944433b00e14ab18de83ec1548f6be84512c80fc7
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFHuRcx:X6QFElP6n+gJQMOtEvwDpjBmzDkWx
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000d000000021dd1-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x000d000000021dd1-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\Control Panel\International\Geo\Nation 2024-04-17_20781810b801d868248bbe674409c936_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4568 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1900 wrote to memory of 4568 1900 2024-04-17_20781810b801d868248bbe674409c936_cryptolocker.exe 86 PID 1900 wrote to memory of 4568 1900 2024-04-17_20781810b801d868248bbe674409c936_cryptolocker.exe 86 PID 1900 wrote to memory of 4568 1900 2024-04-17_20781810b801d868248bbe674409c936_cryptolocker.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-17_20781810b801d868248bbe674409c936_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-17_20781810b801d868248bbe674409c936_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5b4ab9bbbd7a50136220a47c71d01415b
SHA1274b397dbaae1917b43a87426088e79eeafe6096
SHA256d8d0b43a21309355e945a24b57e4c54e8714b726d1f39df8c0f1381347532dc5
SHA512827a2484bb11948270e035cc423d07f4e1c39621ca2a8bb2b3dec6cfbcca46d8fe987d207115348172590b458d404ce84a0ce228cba5786e297ffcb1ca9fed5a