Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 10:19
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-01_c09d017cef9b6774798051c4788ad138_cryptolocker.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-09-01_c09d017cef9b6774798051c4788ad138_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-01_c09d017cef9b6774798051c4788ad138_cryptolocker.exe
-
Size
125KB
-
MD5
c09d017cef9b6774798051c4788ad138
-
SHA1
b2f935fa512084c173a6b40446498a293f833224
-
SHA256
75dcfd335b9e0fa656cb8c17d267261dee832c5c584ddf294537993fa215d1e7
-
SHA512
ced94c60a3d0d6ecfceeae5c11bca63b645bba3fabd0f99347d86e8c007e55d84ba62da490d4b0e2f500ae37518af1ef1eeec78e385ed87d4e6fecd876fa9fa2
-
SSDEEP
1536:u6QFElP6n+gWMOtEvwDpjJGYQbN/PKwMgdlTH:u6a++OtEvwDpj6zv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 2024-09-01_c09d017cef9b6774798051c4788ad138_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4796 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-01_c09d017cef9b6774798051c4788ad138_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3488 wrote to memory of 4796 3488 2024-09-01_c09d017cef9b6774798051c4788ad138_cryptolocker.exe 85 PID 3488 wrote to memory of 4796 3488 2024-09-01_c09d017cef9b6774798051c4788ad138_cryptolocker.exe 85 PID 3488 wrote to memory of 4796 3488 2024-09-01_c09d017cef9b6774798051c4788ad138_cryptolocker.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-01_c09d017cef9b6774798051c4788ad138_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-01_c09d017cef9b6774798051c4788ad138_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD534fda1b6c704f87da3c4e4ff245a6178
SHA1d88c777cf2529b97c42b49573fd17cf7ea608787
SHA25615976e6191eae55523390c25f01cc7865036d0b759da1b7baefb510db51acd2e
SHA51248e9a1273d1e0934e98eb3eb81dbc9adeaa881d4552dc32a68ad1b7b3c8f447c435dbffab507a98edcfac3ca8a39d19134abea76dff6358ffb52d17cb326bed8