Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 18:50
Static task
static1
Behavioral task
behavioral1
Sample
202405215535790bed5f726d3020222a4907b59acryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
202405215535790bed5f726d3020222a4907b59acryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
202405215535790bed5f726d3020222a4907b59acryptolocker.exe
-
Size
48KB
-
MD5
5535790bed5f726d3020222a4907b59a
-
SHA1
5fdba89f285ae35494497394a218124d7d207d89
-
SHA256
68ffad18f738fda4c5d6820be2fef8418aa340e47d1f21ff332da48699882082
-
SHA512
add93887f1454da8c004edff5c9452875c79df46a1f399a30c0b5b55285dbdbe5cd49431a97b0a5b3df42ba99699a5808a42343f5f4ca0b73637bbbd68d49186
-
SSDEEP
768:P6LsoVEeegiZPvEhHSP+gp/QtOOtEvwDpjBBMLZdzuqpXsiE8Wq/DpkcI:P6Q0ElP6G+gJQMOtEvwDpjB8WMlfI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
202405215535790bed5f726d3020222a4907b59acryptolocker.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 202405215535790bed5f726d3020222a4907b59acryptolocker.exe -
Executes dropped EXE 1 IoCs
Processes:
asih.exepid process 1068 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
202405215535790bed5f726d3020222a4907b59acryptolocker.exedescription pid process target process PID 1692 wrote to memory of 1068 1692 202405215535790bed5f726d3020222a4907b59acryptolocker.exe asih.exe PID 1692 wrote to memory of 1068 1692 202405215535790bed5f726d3020222a4907b59acryptolocker.exe asih.exe PID 1692 wrote to memory of 1068 1692 202405215535790bed5f726d3020222a4907b59acryptolocker.exe asih.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\202405215535790bed5f726d3020222a4907b59acryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\202405215535790bed5f726d3020222a4907b59acryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD578a137438e122b10a6369c036f10c148
SHA1d1885a42250a7ce4e341516090f448a4999526ed
SHA2567c465fbd4bd4c595da054855436f4409f739dac12a283fdd30da62515826173e
SHA512dd41fd71ed218dc6d20f77b3327d93d4c26e3390489f393a5422c493e0d2a754c4d961ecf9f67098dca2564cef337644771354829684159ba4d6abc61a7c9fa4