Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_4300c5cc31350b98947b25f70810290f_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-22_4300c5cc31350b98947b25f70810290f_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-22_4300c5cc31350b98947b25f70810290f_cryptolocker.exe
-
Size
64KB
-
MD5
4300c5cc31350b98947b25f70810290f
-
SHA1
1f61b45b4808c02cedd5d231262267c47be38baa
-
SHA256
dc0a4db5abb5eb59ab67da5c063f6da9339f7311655cdb249d69b6fed2bd6a4e
-
SHA512
17f82f7fee2c3c7465eb5eb0d3b5f62e8ff2727bdd6acd71ea3fae3ed51f14dfd6665c1f9dc16e8d6223afcc810f14d645fb0c894e612e62c3441c17b64f2c9e
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBccD2RuoNmuBLZ/xblzogj:X6a+SOtEvwDpjBrOV
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\asih.exe CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\asih.exe CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2024-05-22_4300c5cc31350b98947b25f70810290f_cryptolocker.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 2024-05-22_4300c5cc31350b98947b25f70810290f_cryptolocker.exe -
Executes dropped EXE 1 IoCs
Processes:
asih.exepid process 3008 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-05-22_4300c5cc31350b98947b25f70810290f_cryptolocker.exedescription pid process target process PID 4712 wrote to memory of 3008 4712 2024-05-22_4300c5cc31350b98947b25f70810290f_cryptolocker.exe asih.exe PID 4712 wrote to memory of 3008 4712 2024-05-22_4300c5cc31350b98947b25f70810290f_cryptolocker.exe asih.exe PID 4712 wrote to memory of 3008 4712 2024-05-22_4300c5cc31350b98947b25f70810290f_cryptolocker.exe asih.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_4300c5cc31350b98947b25f70810290f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_4300c5cc31350b98947b25f70810290f_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD50ebc2e195eb7365e5f2e951f410b57a4
SHA197aee52c8271e784707f2d7d4f82bc39bc232421
SHA2569911366338040ca131783e2d7a576728567c2b38d28214334fa6f5c2caa961fe
SHA5126b41ad3a7c76eb90c291c802b2ba37259fc7fb2736d72f0a2760fc027d357d183b3c1c7f8c8256ca405119d643c3edf17669f95ae37bd32838f61e4b477cbadd