Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 14:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-09_dff9e1fdc91aee321b16cdb286b5db87_cryptolocker.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-07-09_dff9e1fdc91aee321b16cdb286b5db87_cryptolocker.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-09_dff9e1fdc91aee321b16cdb286b5db87_cryptolocker.exe
-
Size
49KB
-
MD5
dff9e1fdc91aee321b16cdb286b5db87
-
SHA1
db5655441ede1a080e864ff85e39f52b9fadd8b5
-
SHA256
60e5d544749e895b1cb5a7d4b721a0d4ab4f06fc77c671b9768b66dd2f5cbbff
-
SHA512
173a23f1cac2552783dc76f22acfc3271546a3076bce274b2fa67b3cb6d1bf7162123de1df32f529d4e61578c6a7936e1f1703d8a8c1e4db63aff6c5abff1b6c
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu556BlvsTN:X6QFElP6n+gJQMOtEvwDpjB0GIWSlvIN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1015551233-1106003478-1645743776-1000\Control Panel\International\Geo\Nation 2024-07-09_dff9e1fdc91aee321b16cdb286b5db87_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 908 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1520 wrote to memory of 908 1520 2024-07-09_dff9e1fdc91aee321b16cdb286b5db87_cryptolocker.exe 84 PID 1520 wrote to memory of 908 1520 2024-07-09_dff9e1fdc91aee321b16cdb286b5db87_cryptolocker.exe 84 PID 1520 wrote to memory of 908 1520 2024-07-09_dff9e1fdc91aee321b16cdb286b5db87_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-09_dff9e1fdc91aee321b16cdb286b5db87_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-09_dff9e1fdc91aee321b16cdb286b5db87_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5224e2ff77eadf2028d8e3aea822f7ff8
SHA149c5977f540a3afc36f28222a142bbf7ed0cd5ef
SHA256ebc992781e744045d5716b24f5270fba1c0d400e9e1b5c0f5c019c1478a42dc3
SHA512bd6991cb29d2b03b67cea9803482b0a89b2a24042555c5acd332a9e6e148381cf33ec1a30ff4f632c0359617644dea985ff078bcc71f835b85d1b89dbf448305