Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-06-2024 07:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-09_826de93d0221cf8cf4c76cd860f9e7df_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-09_826de93d0221cf8cf4c76cd860f9e7df_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-09_826de93d0221cf8cf4c76cd860f9e7df_cryptolocker.exe
-
Size
76KB
-
MD5
826de93d0221cf8cf4c76cd860f9e7df
-
SHA1
8a74e59d5f301ff7d330155752e6ab512f35562e
-
SHA256
55043ebd76ef39827884eb8754fa927d8445ebcb396155c335da4bc92fbbf581
-
SHA512
fa4d26838dacadfcb5192a25bbf0110145420e2dab409b2826237e20d671a1b7c64f58afb8e706da3ffe6d36c3cdce74c622672d0d78c2c06588c91f36519032
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1rHsoLk/:X6a+SOtEvwDpjBZYvQd2g
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0006000000023270-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x0006000000023270-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 2024-06-09_826de93d0221cf8cf4c76cd860f9e7df_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4704 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4672 wrote to memory of 4704 4672 2024-06-09_826de93d0221cf8cf4c76cd860f9e7df_cryptolocker.exe 80 PID 4672 wrote to memory of 4704 4672 2024-06-09_826de93d0221cf8cf4c76cd860f9e7df_cryptolocker.exe 80 PID 4672 wrote to memory of 4704 4672 2024-06-09_826de93d0221cf8cf4c76cd860f9e7df_cryptolocker.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_826de93d0221cf8cf4c76cd860f9e7df_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-09_826de93d0221cf8cf4c76cd860f9e7df_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD528a3b1299973f556bbbce538c9893860
SHA18d8a4eda3cf76ea6f4155cdf969b816e350fa84c
SHA2564d63d4bee080374697357c55c599a9a463d14333e80c3bb34db9aa12fe565211
SHA5122dd9891abe85d7f6d507997c1acc4326fe7917e5bf17b6be3a02ab01943eff7e50096280b34ca39d5c1a8b26046ad865afb2937974db98342e3c154d2c54154c