Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2024 05:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-30_ed90487094ee61c2a730ce5ab9f13c15_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-30_ed90487094ee61c2a730ce5ab9f13c15_cryptolocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-30_ed90487094ee61c2a730ce5ab9f13c15_cryptolocker.exe
-
Size
45KB
-
MD5
ed90487094ee61c2a730ce5ab9f13c15
-
SHA1
b582df9406f6f81a7c30ef03b14795ad59ee61c4
-
SHA256
8e9da85fe5706b4ed06ab8ecb185546435cb58046986b5dcbef175e145f47d26
-
SHA512
6850c27dc24dc2ec85e0c83341698ab7c76d35110e05afba71dca3086782049d5c221f7f12a228a556820ae38cb62af49dff0354b007b0274c67612d263d1433
-
SSDEEP
768:bxNQIE0eBhkL2Fo1CCwgfjOg1tsJ6zeen754XcwxbFp1Yvb9wAm:bxNrC7kYo1Fxf3s05rwxbF7YvbQ
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023b6a-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation 2024-04-30_ed90487094ee61c2a730ce5ab9f13c15_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4856 pissa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2336 wrote to memory of 4856 2336 2024-04-30_ed90487094ee61c2a730ce5ab9f13c15_cryptolocker.exe 83 PID 2336 wrote to memory of 4856 2336 2024-04-30_ed90487094ee61c2a730ce5ab9f13c15_cryptolocker.exe 83 PID 2336 wrote to memory of 4856 2336 2024-04-30_ed90487094ee61c2a730ce5ab9f13c15_cryptolocker.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-30_ed90487094ee61c2a730ce5ab9f13c15_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-30_ed90487094ee61c2a730ce5ab9f13c15_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\pissa.exe"C:\Users\Admin\AppData\Local\Temp\pissa.exe"2⤵
- Executes dropped EXE
PID:4856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5d93aac43cc5f11780e4385040726e2b6
SHA18a0fb8fd9a77b72cbffd95a1deaeff9e18765041
SHA256c1272495db02537b718f59633c51a9105fb2d1a2969ab263888e1bcfabdb1894
SHA512a7f0f1c7ffaecbcf9a9b6773bd40339696e02815fe79db8fc93e3631e578daa19aa8c88c414e8f5f8197edf716dc60a0305c74b8c26daebeb0681eca527d2049