Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2024, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-04_0a96eb2b0ff4b33f8bf43f9f9f32c809_cryptolocker.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-09-04_0a96eb2b0ff4b33f8bf43f9f9f32c809_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-04_0a96eb2b0ff4b33f8bf43f9f9f32c809_cryptolocker.exe
-
Size
36KB
-
MD5
0a96eb2b0ff4b33f8bf43f9f9f32c809
-
SHA1
5303e143281b3cfee3d12a6ac159e5784c212714
-
SHA256
50a71a0068c9c30dfafed25c435e9cb5ca82de1aeb9b32a9f1417369f86c98c7
-
SHA512
7ab0043b2e257a9b436cc26731767a8fc21c7335f94b6601ceaff294f5be2618b7749d2f5f849d620dedb9cac24a0684a0370072a0531f93ba29d4bed0eb09e3
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DYox:X6QFElP6n+gJQMOtEvwDpjBmzDYM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 2024-09-04_0a96eb2b0ff4b33f8bf43f9f9f32c809_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3016 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-04_0a96eb2b0ff4b33f8bf43f9f9f32c809_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3412 wrote to memory of 3016 3412 2024-09-04_0a96eb2b0ff4b33f8bf43f9f9f32c809_cryptolocker.exe 87 PID 3412 wrote to memory of 3016 3412 2024-09-04_0a96eb2b0ff4b33f8bf43f9f9f32c809_cryptolocker.exe 87 PID 3412 wrote to memory of 3016 3412 2024-09-04_0a96eb2b0ff4b33f8bf43f9f9f32c809_cryptolocker.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-04_0a96eb2b0ff4b33f8bf43f9f9f32c809_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-04_0a96eb2b0ff4b33f8bf43f9f9f32c809_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD55dd977eecc81d615bdf79ccd24b7fb83
SHA1ee9ddd8c1dc19210b4533fe325a455900a760e3e
SHA256f299d79cdb76f21a5b286f8b41bf24c5f4fb3fc2a12bd598a6bcab26af37ebd3
SHA512be1fa1db2e7f25a3445b9d235b94ade2f4790fe2c904390fa617b7694a57eb6ef44d9b0e51d5135f0b1707022e4996d06eead04aedd7b18463646874e3754af6