Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 14:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-20_5039e02e74a26c2e4a3a3367455f4da2_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-20_5039e02e74a26c2e4a3a3367455f4da2_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-20_5039e02e74a26c2e4a3a3367455f4da2_cryptolocker.exe
-
Size
86KB
-
MD5
5039e02e74a26c2e4a3a3367455f4da2
-
SHA1
e9389eefeff66ae3f272141d2a63e88a8a5efba9
-
SHA256
4d0b4b80dc9744f54e552a2aba873b2857d96e6eb7d59bb113c28638b5507670
-
SHA512
3d0e457bbc4d424cd45296dbdd7b49c243a00b84867652fd3c17602098474da4c2cc84ee6d3863bea5cbf9c1626e45bbc4f58f2b877ddab33eab2e4413490f33
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjyaLccVNl6a5:V6a+pOtEvwDpjvpN
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000c0000000233be-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x000c0000000233be-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 2024-05-20_5039e02e74a26c2e4a3a3367455f4da2_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 984 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3484 wrote to memory of 984 3484 2024-05-20_5039e02e74a26c2e4a3a3367455f4da2_cryptolocker.exe 82 PID 3484 wrote to memory of 984 3484 2024-05-20_5039e02e74a26c2e4a3a3367455f4da2_cryptolocker.exe 82 PID 3484 wrote to memory of 984 3484 2024-05-20_5039e02e74a26c2e4a3a3367455f4da2_cryptolocker.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-20_5039e02e74a26c2e4a3a3367455f4da2_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-20_5039e02e74a26c2e4a3a3367455f4da2_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5961dcae4fe33dc1ccf6b5ccabcd9d453
SHA1a8625e23b497fb1248bac414930a86b7d1d61a02
SHA25655c84bc833b7a870f434704cfec50e54cf79c855b7cc45f8ae8a9bf4c02cc120
SHA512599c8fb1fe0ce9f8b1c06388ac6cfbe9af3d5e42abab59e7d699e601f6a4f43d4491b7a581f2ed46798205b791c042c2f5732a11d43ea0c3f5964e70760754dd