Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-02_be4ef9318776e3ea23e4f8d456e76aa8_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-02_be4ef9318776e3ea23e4f8d456e76aa8_cryptolocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-02_be4ef9318776e3ea23e4f8d456e76aa8_cryptolocker.exe
-
Size
51KB
-
MD5
be4ef9318776e3ea23e4f8d456e76aa8
-
SHA1
cd176453850006cbbc2777ec24accfdcd638f7dc
-
SHA256
1961ecc5ee556a9d75adfbd7ed262ebb61fbf6fefabe61bd4a9451bed3a945c6
-
SHA512
3717edf54076a3f64296359fe07df3d8266ef02c8dcd8b3e6302980821230addeb77104a1b50571662c8022e350433742ad05d5645531a3eb6b43e6e95e70e96
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/BtOOtEvwDpjBVaD3E09vxmlcaH:X6QFElP6n+gJBMOtEvwDpjBtExml/
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023b5b-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023b5b-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation 2024-05-02_be4ef9318776e3ea23e4f8d456e76aa8_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 5116 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4180 wrote to memory of 5116 4180 2024-05-02_be4ef9318776e3ea23e4f8d456e76aa8_cryptolocker.exe 84 PID 4180 wrote to memory of 5116 4180 2024-05-02_be4ef9318776e3ea23e4f8d456e76aa8_cryptolocker.exe 84 PID 4180 wrote to memory of 5116 4180 2024-05-02_be4ef9318776e3ea23e4f8d456e76aa8_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-02_be4ef9318776e3ea23e4f8d456e76aa8_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-02_be4ef9318776e3ea23e4f8d456e76aa8_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:5116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD52108adac2f4bfce43a61e8cf35eb7411
SHA1b01d405662d83ae96228dcd4f6dd619de19b22f3
SHA256b91d0e504e3d23def6065659da19bce9bc599768605b7e583aa8228220e8fa6b
SHA51250b088b859de59727ac753402b145a2520297ffcb98b1a4c075c0b6da7402b27b2ebfa9cdab37b3c191506b41a148a7ffbfee343f68f551f06faeeb71081cb43