Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 06:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-10_220dec99487590c0d93f877abe60aef3_cryptolocker.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-10_220dec99487590c0d93f877abe60aef3_cryptolocker.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-10_220dec99487590c0d93f877abe60aef3_cryptolocker.exe
-
Size
34KB
-
MD5
220dec99487590c0d93f877abe60aef3
-
SHA1
d724111cc2622a14934c6350d510b8b4c95d3f43
-
SHA256
3e041402edc12998694e59b5d41b1f6d6de9662df3de591e7ea57c65085b5ec7
-
SHA512
156248d755780b743acb185ff15d1a482439c576c9f0ee49625a3b06d61c8183f3e75ee7de3800abb6e9e51b956a333948de17fa2c1db904292fc8562834af0b
-
SSDEEP
384:bG74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUGTGXvxh3+:bG74zYcgT/Ekd0ryfjke
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 2024-07-10_220dec99487590c0d93f877abe60aef3_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 888 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3468 wrote to memory of 888 3468 2024-07-10_220dec99487590c0d93f877abe60aef3_cryptolocker.exe 84 PID 3468 wrote to memory of 888 3468 2024-07-10_220dec99487590c0d93f877abe60aef3_cryptolocker.exe 84 PID 3468 wrote to memory of 888 3468 2024-07-10_220dec99487590c0d93f877abe60aef3_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-10_220dec99487590c0d93f877abe60aef3_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-10_220dec99487590c0d93f877abe60aef3_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5d258531a852e8602b818dc2dd9816da5
SHA1231e5d2b478df7c27e1896d6a3f703ae62dc8e7c
SHA256aa9c49a107aa49c888c5e7f437e48190c188b957b9d71401ddddb6cedeeecff1
SHA5122d3fa3d333bf80a74266962bf2bcb9cdf925a0bf6a48da748cecb5d78c6d4a976e10776919e3f89a12f15dd703db9cd4cac0e35cc67890b4aab0a6817c94fa1b