Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 20:06
Behavioral task
behavioral1
Sample
2024-09-01_1a43645a2be7cb9c453531a06c49febe_cryptolocker.exe
Resource
win7-20240705-en
General
-
Target
2024-09-01_1a43645a2be7cb9c453531a06c49febe_cryptolocker.exe
-
Size
36KB
-
MD5
1a43645a2be7cb9c453531a06c49febe
-
SHA1
24d78a8d1b56221fbf539ce4e8be913f222fd5eb
-
SHA256
6054312339d49008c081dbc8c3e9246c95accd77177e59796ab17be00c6df6a0
-
SHA512
eaa52d27af5bd43ce6616fcd0b6b0dc456bc05db5a5292ce034d6d1b97fb4aaa6229f146b8611a7f4c3e5c77e98451e57d06e264cb2f552b5301b4dfbe87e3ae
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkIT65:qDdFJy3QMOtEvwDpjjWMl7T65
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation 2024-09-01_1a43645a2be7cb9c453531a06c49febe_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 1936 asih.exe -
resource yara_rule behavioral2/memory/2748-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x0009000000023474-13.dat upx behavioral2/memory/2748-18-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1936-27-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-01_1a43645a2be7cb9c453531a06c49febe_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2748 wrote to memory of 1936 2748 2024-09-01_1a43645a2be7cb9c453531a06c49febe_cryptolocker.exe 86 PID 2748 wrote to memory of 1936 2748 2024-09-01_1a43645a2be7cb9c453531a06c49febe_cryptolocker.exe 86 PID 2748 wrote to memory of 1936 2748 2024-09-01_1a43645a2be7cb9c453531a06c49febe_cryptolocker.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-01_1a43645a2be7cb9c453531a06c49febe_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-01_1a43645a2be7cb9c453531a06c49febe_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD593f2a24aa3951869f36d2a03711c60a2
SHA17bf0b81fd1ee3e977fdadf2202e1b913f4875083
SHA25667091685b0594ef8b03842944a6749ec71f353e3f085dfa388f456a2ac368eb2
SHA512bdb894855b50cb6aa2dfbb1097541d911d5e0bb16ec91359a715fba2e4e9443b36cb7337d98223937e4070e996fa3a546f20baf614fd4cfea47fa9712f671801