Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 09:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-19_89dcd86a8274b6dbb2bac80bcb57f0f2_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-19_89dcd86a8274b6dbb2bac80bcb57f0f2_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-19_89dcd86a8274b6dbb2bac80bcb57f0f2_cryptolocker.exe
-
Size
100KB
-
MD5
89dcd86a8274b6dbb2bac80bcb57f0f2
-
SHA1
94dac076696164d2b967cb3ae99aaee4ea0c2022
-
SHA256
81720a514148226d11e12c3e83082b2dfcc58be2d22dd884c1c3a93dd36ce20d
-
SHA512
50e780fdd57fc51593717e3192ef1f089628170bf067035c14e95b13be6d1050d06bf0f872e01142493cff1ef819297bb2f9eaba1dc7898e1ab56d9d7a63700b
-
SSDEEP
1536:26QFElP6n+gBQMOtEvwDpjQGYQbN/PKwNCWwa:26a+2OtEvwDpjtzV
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000800000001db0e-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x000800000001db0e-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation 2024-04-19_89dcd86a8274b6dbb2bac80bcb57f0f2_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3336 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4940 wrote to memory of 3336 4940 2024-04-19_89dcd86a8274b6dbb2bac80bcb57f0f2_cryptolocker.exe 87 PID 4940 wrote to memory of 3336 4940 2024-04-19_89dcd86a8274b6dbb2bac80bcb57f0f2_cryptolocker.exe 87 PID 4940 wrote to memory of 3336 4940 2024-04-19_89dcd86a8274b6dbb2bac80bcb57f0f2_cryptolocker.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-19_89dcd86a8274b6dbb2bac80bcb57f0f2_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-19_89dcd86a8274b6dbb2bac80bcb57f0f2_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD548ff1584f6b9af3576ba23832de58932
SHA12fae3245deb7ba57422486b812aea0bab6d9e9f7
SHA2563f439af8479869b58fe8c9ac10976022c2c588c3fca65d9cda81eca3818e09f3
SHA5124e4199bc06844717b05f200b3e640ba30d453e43b76682c4837e78da4e6bf571aa8ef683472b7ca4cc45324ca9e9daa2b470818d7c3f6da80a7af361eb5f8dfc