Analysis
-
max time kernel
136s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 03:58
Behavioral task
behavioral1
Sample
2024-05-24_ae527a35fe064cec4221b30fbbe6cad8_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-24_ae527a35fe064cec4221b30fbbe6cad8_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-05-24_ae527a35fe064cec4221b30fbbe6cad8_cryptolocker.exe
-
Size
92KB
-
MD5
ae527a35fe064cec4221b30fbbe6cad8
-
SHA1
b0512cd967fe99e8c1748b0f928d6e8e3919c4d3
-
SHA256
c91f27d812caea0209e89fcded4803cddbfe85862ed02542fb3ed5d9c7fd46dc
-
SHA512
84f785383c3179b143acd1c8bbecfa82bcc7345b31769df693b904998bf35d4a4686557569ecc0d07f03954be907d400277ea44288281417c562d1e7cd77a351
-
SSDEEP
1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/D5:n6a+1SEOtEvwDpjYYvQd2Pe
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4752-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 C:\Users\Admin\AppData\Local\Temp\asih.exe CryptoLocker_rule2 behavioral2/memory/4752-16-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral2/memory/3000-26-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4752-0-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 C:\Users\Admin\AppData\Local\Temp\asih.exe CryptoLocker_set1 behavioral2/memory/4752-16-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral2/memory/3000-26-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4752-0-0x0000000000500000-0x0000000000510000-memory.dmp UPX C:\Users\Admin\AppData\Local\Temp\asih.exe UPX behavioral2/memory/4752-16-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral2/memory/3000-26-0x0000000000500000-0x0000000000510000-memory.dmp UPX -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2024-05-24_ae527a35fe064cec4221b30fbbe6cad8_cryptolocker.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2024-05-24_ae527a35fe064cec4221b30fbbe6cad8_cryptolocker.exe -
Executes dropped EXE 1 IoCs
Processes:
asih.exepid process 3000 asih.exe -
Processes:
resource yara_rule behavioral2/memory/4752-0-0x0000000000500000-0x0000000000510000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\asih.exe upx behavioral2/memory/4752-16-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3000-26-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-05-24_ae527a35fe064cec4221b30fbbe6cad8_cryptolocker.exedescription pid process target process PID 4752 wrote to memory of 3000 4752 2024-05-24_ae527a35fe064cec4221b30fbbe6cad8_cryptolocker.exe asih.exe PID 4752 wrote to memory of 3000 4752 2024-05-24_ae527a35fe064cec4221b30fbbe6cad8_cryptolocker.exe asih.exe PID 4752 wrote to memory of 3000 4752 2024-05-24_ae527a35fe064cec4221b30fbbe6cad8_cryptolocker.exe asih.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_ae527a35fe064cec4221b30fbbe6cad8_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-24_ae527a35fe064cec4221b30fbbe6cad8_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3808 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:3744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5b9c0fae7b2fdb499767472de4169de3a
SHA1184a671e15e0d3f2efa976dfff529d4787589d3a
SHA256a81d4dd4526a7c99bf21c3129a162c42dedd44ba668af1d01d89991235a7f5e9
SHA512c8cc359ff03fbf8496adaf4f08cba74470f32e401022f4ca49d7b195b7f3d7ebe67132e66ddafd3a1f43c987f90a2bdef9d07aaec814b2cdb8a085c71d30609f