Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 21:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-10_717c08d789aa2434d03267107e04bfff_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-10_717c08d789aa2434d03267107e04bfff_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-10_717c08d789aa2434d03267107e04bfff_cryptolocker.exe
-
Size
51KB
-
MD5
717c08d789aa2434d03267107e04bfff
-
SHA1
73a7e48e8d8d5e01d40900cd52266fae42a8447c
-
SHA256
f4f920878715cb4b837b77f94cf976fcdd8aeba3d8da654269447df6838f43e1
-
SHA512
4825ff712edb4f210c473d97a5c4e01b60d111cb6e28da4829b010bf195bfda2b366c55b6f98baa69c7f8bebfd7a6efe0ab24deed4787ad91c74209504424f7b
-
SSDEEP
768:79inqyNR/QtOOtEvwDpjBK/rJ+Nw8qnTHGf0:79mqyNhQMOtEvwDpjBxe8GGf0
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral2/memory/3076-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x000600000002297c-13.dat CryptoLocker_rule2 behavioral2/memory/4700-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral2/memory/3076-18-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral2/memory/3076-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral2/files/0x000600000002297c-13.dat CryptoLocker_set1 behavioral2/memory/4700-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral2/memory/3076-18-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 2024-05-10_717c08d789aa2434d03267107e04bfff_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4700 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3076 wrote to memory of 4700 3076 2024-05-10_717c08d789aa2434d03267107e04bfff_cryptolocker.exe 85 PID 3076 wrote to memory of 4700 3076 2024-05-10_717c08d789aa2434d03267107e04bfff_cryptolocker.exe 85 PID 3076 wrote to memory of 4700 3076 2024-05-10_717c08d789aa2434d03267107e04bfff_cryptolocker.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_717c08d789aa2434d03267107e04bfff_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-10_717c08d789aa2434d03267107e04bfff_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5341b1e50b368b33a212a4838c0b16510
SHA16505598192b9a91bfa9e91f0f385efe3686c5eae
SHA256396ff774dd7d5f1d036713e70cd68a457ded57a30427c5fc61030c53bb38ec54
SHA51211e237fa318e0e9ecc377c519044cafdd7067a6025b63bab20a4a7d1e8c5be39d9f6849aa82db093e1626f80bcdfde9007720700a3351a15c0fdb2fd628a258f