Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 00:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-12_a7bd4e0b80698d83c21dbb347770b0be_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-12_a7bd4e0b80698d83c21dbb347770b0be_cryptolocker.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-12_a7bd4e0b80698d83c21dbb347770b0be_cryptolocker.exe
-
Size
77KB
-
MD5
a7bd4e0b80698d83c21dbb347770b0be
-
SHA1
29a1a8ff8dfbc838eda07938581ed1e06def650b
-
SHA256
4464116caef6ed71e0756a8dffa8326a95c8a36145f2d34b03206d39bfe07840
-
SHA512
c6bccd895805950858e4026b61417c643f4042184c1f3b050b8196517e9bbb79fd6555944791e930c674a52d7164b9c3f82eb9bba9e58c4eac7fca3e4f77b219
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1sim:X6a+SOtEvwDpjBZYvQd2A
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000600000002329a-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x000600000002329a-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation 2024-06-12_a7bd4e0b80698d83c21dbb347770b0be_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4604 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1384 wrote to memory of 4604 1384 2024-06-12_a7bd4e0b80698d83c21dbb347770b0be_cryptolocker.exe 81 PID 1384 wrote to memory of 4604 1384 2024-06-12_a7bd4e0b80698d83c21dbb347770b0be_cryptolocker.exe 81 PID 1384 wrote to memory of 4604 1384 2024-06-12_a7bd4e0b80698d83c21dbb347770b0be_cryptolocker.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-12_a7bd4e0b80698d83c21dbb347770b0be_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-12_a7bd4e0b80698d83c21dbb347770b0be_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5b95e5cd86eb908afe541a5d909bf38e7
SHA13fd4e464fc5431f6fc23cea0659746edc1876983
SHA256d75537283b26bcd0a13762393c40d2e957617ccb832ad1bac0ee71537a22017a
SHA512ae66a2679a1ea49464f25e24312e7fd1ee0d420665909e85691524403b138125d58a058b31dbe6f394db53a3f16e7e66c35acaa7da76a1b41122213cfb32b2e8