Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 04:36
Behavioral task
behavioral1
Sample
2024-05-29_aa71597e3dbeb4accf35ac989307f8b9_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-29_aa71597e3dbeb4accf35ac989307f8b9_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-29_aa71597e3dbeb4accf35ac989307f8b9_cryptolocker.exe
-
Size
95KB
-
MD5
aa71597e3dbeb4accf35ac989307f8b9
-
SHA1
43e63c09d325ae2cf9c142651b21c2db3cd4391c
-
SHA256
a97c3e527f4fa0465ad13ae5eae6d07be0a6ccc4350cdb9d1f61b850b9f795d9
-
SHA512
95f41ebcdac886b6f34b231f8de887216764b5e862f760a575cd99b02e531db2f0c5b7cd585b2b0cbc899d197513a0abe343c0c56f799e8b8595e4797875c03c
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp0+S:AnBdOOtEvwDpj6z1
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral2/memory/2804-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x0006000000023284-13.dat CryptoLocker_rule2 behavioral2/memory/2024-19-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral2/memory/2804-18-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral2/memory/2024-28-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral2/memory/2804-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral2/files/0x0006000000023284-13.dat CryptoLocker_set1 behavioral2/memory/2024-19-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral2/memory/2804-18-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral2/memory/2024-28-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral2/memory/2804-0-0x0000000000500000-0x000000000050F000-memory.dmp UPX behavioral2/files/0x0006000000023284-13.dat UPX behavioral2/memory/2024-19-0x0000000000500000-0x000000000050F000-memory.dmp UPX behavioral2/memory/2804-18-0x0000000000500000-0x000000000050F000-memory.dmp UPX behavioral2/memory/2024-28-0x0000000000500000-0x000000000050F000-memory.dmp UPX -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 2024-05-29_aa71597e3dbeb4accf35ac989307f8b9_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2024 asih.exe -
resource yara_rule behavioral2/memory/2804-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/files/0x0006000000023284-13.dat upx behavioral2/memory/2024-19-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/2804-18-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/2024-28-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2024 2804 2024-05-29_aa71597e3dbeb4accf35ac989307f8b9_cryptolocker.exe 82 PID 2804 wrote to memory of 2024 2804 2024-05-29_aa71597e3dbeb4accf35ac989307f8b9_cryptolocker.exe 82 PID 2804 wrote to memory of 2024 2804 2024-05-29_aa71597e3dbeb4accf35ac989307f8b9_cryptolocker.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-29_aa71597e3dbeb4accf35ac989307f8b9_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-29_aa71597e3dbeb4accf35ac989307f8b9_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD598c9ca1e369af5b1cfe0eac14026470d
SHA124b5a64afa895bed33cb9ddae0656e709a1aed1c
SHA256f85e9aaf0cafce339c00a250d458d2ad4e44def0fe6f261708e8cb4da945cdbb
SHA5122fd52c4f0e7d8c438fb9c5a293574332180f60cf76491970deb9f46653746fb603341b7fe183a467bdfae0dd82df78e26d379947ccb3cbe47cb67cb4a3d598c9