Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-03_f702e082bcc4f31b9ae0e8d256eb2cfd_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-03_f702e082bcc4f31b9ae0e8d256eb2cfd_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-03_f702e082bcc4f31b9ae0e8d256eb2cfd_cryptolocker.exe
-
Size
44KB
-
MD5
f702e082bcc4f31b9ae0e8d256eb2cfd
-
SHA1
63a23ce85eea61d969136ac31b9684546fb4b2bf
-
SHA256
ffc038fdd0b79d353509c54df515fbc8a27dea79b533fd609a0d5568e5fca5dd
-
SHA512
fbf0966dea6b3dd06203f72849a38b9d96dc9ea8aaefa7f9fe58560ac9d11827c6b66b046efbfe24b5803ea7010387687f8f7017ba08f8a8af51d9aac3bf9d02
-
SSDEEP
384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jo0nrlwfjDUIG6GUc:bm74zYcgT/Ekn0ryfji7Uc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation 2024-09-03_f702e082bcc4f31b9ae0e8d256eb2cfd_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4728 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-03_f702e082bcc4f31b9ae0e8d256eb2cfd_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hasfj.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2912 wrote to memory of 4728 2912 2024-09-03_f702e082bcc4f31b9ae0e8d256eb2cfd_cryptolocker.exe 92 PID 2912 wrote to memory of 4728 2912 2024-09-03_f702e082bcc4f31b9ae0e8d256eb2cfd_cryptolocker.exe 92 PID 2912 wrote to memory of 4728 2912 2024-09-03_f702e082bcc4f31b9ae0e8d256eb2cfd_cryptolocker.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-03_f702e082bcc4f31b9ae0e8d256eb2cfd_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-03_f702e082bcc4f31b9ae0e8d256eb2cfd_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4108,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4020 /prefetch:81⤵PID:1380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD504c891a1dbf74195768582dcee688f0f
SHA1413cb6af4bc3c55f7f7f04aad2ac7b73cc234890
SHA2564987cd239aa70f449fafa7f4d959a53392855524c8783887c482e0f5aa5ddd17
SHA51236289a852b35c48154a18566466f6bce711a81fdc050d2c30263a20bf77968cb3cbe37f0d9fd5e2c5d51c71a717e7018b2de79b44b4f925259ae82dc3cf2d3b8