Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 06:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-16_08d324a738d706b2c8055ad2c7890070_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-16_08d324a738d706b2c8055ad2c7890070_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-16_08d324a738d706b2c8055ad2c7890070_cryptolocker.exe
-
Size
39KB
-
MD5
08d324a738d706b2c8055ad2c7890070
-
SHA1
a8fec0c4fb1c3a5afd74adda4d73611a6534993a
-
SHA256
1e36cc1419f6407fda40d97c8ce8ecdd1d44814f7aae12a751bdfa733109dcb1
-
SHA512
6c86c815ef883146ac1e169f3053c8dbc32d05d912951662d1f92c1dd069a64ce3c71d9dfe658436a3c0172f06718a94865a1343ddcaf5fcf216e8fa65d38476
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFCw0c:X6QFElP6n+gJQMOtEvwDpjBmzDU5c
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000a00000002328e-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x000a00000002328e-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 2024-05-16_08d324a738d706b2c8055ad2c7890070_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4924 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1556 wrote to memory of 4924 1556 2024-05-16_08d324a738d706b2c8055ad2c7890070_cryptolocker.exe 83 PID 1556 wrote to memory of 4924 1556 2024-05-16_08d324a738d706b2c8055ad2c7890070_cryptolocker.exe 83 PID 1556 wrote to memory of 4924 1556 2024-05-16_08d324a738d706b2c8055ad2c7890070_cryptolocker.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-16_08d324a738d706b2c8055ad2c7890070_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-16_08d324a738d706b2c8055ad2c7890070_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5c63be862f155f826a883f8b812e18fda
SHA1991d1aa6553c70dc4c75b586c5c5074445846290
SHA25692fbb00ec78435323b82a38323e1af54b16e089520ef938c3e2e800516d38d15
SHA512a95ecede246bccb176fa78a62a905887569372a44c791e6359501c1674bce706aec0f8161a3d3a17aa3451b0a123804261ddd793b42ac60ac349f749f55dd50f