Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-05_8034ad1f7c634d0d2a489079ea1d85c0_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-05_8034ad1f7c634d0d2a489079ea1d85c0_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-05_8034ad1f7c634d0d2a489079ea1d85c0_cryptolocker.exe
-
Size
44KB
-
MD5
8034ad1f7c634d0d2a489079ea1d85c0
-
SHA1
ce9d217bbf727a853adcf4a7fa54b7911e4a46c4
-
SHA256
f8798381aa7577b29d5125492f3b2caa97b08350cbc7d8972b5451dd2cf4586b
-
SHA512
00057b1349d71e964bc756ca801ad49356df21bdaac279bb9815086eb895739d7e5588a508b9eb7954679566dbfc15c833b79f17e371a7e8685c89b319b67523
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFHuRcD9HdE:X6QFElP6n+gJQMOtEvwDpjBmzDkWDtdE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 2024-09-05_8034ad1f7c634d0d2a489079ea1d85c0_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3560 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-05_8034ad1f7c634d0d2a489079ea1d85c0_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1484 wrote to memory of 3560 1484 2024-09-05_8034ad1f7c634d0d2a489079ea1d85c0_cryptolocker.exe 85 PID 1484 wrote to memory of 3560 1484 2024-09-05_8034ad1f7c634d0d2a489079ea1d85c0_cryptolocker.exe 85 PID 1484 wrote to memory of 3560 1484 2024-09-05_8034ad1f7c634d0d2a489079ea1d85c0_cryptolocker.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-05_8034ad1f7c634d0d2a489079ea1d85c0_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-05_8034ad1f7c634d0d2a489079ea1d85c0_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5a83be44455de2822f11d4fb259781083
SHA1808b75c0ac8853ff1503b0fe5e7b9ebddc0fda25
SHA256498cf8a0cc355740e6586da4fe9e5e2c8b9737818189d6accb46d929a42b42b4
SHA51234b40bb568145b64b223bd1ad5db99482254c1dfc18f87e8d6de01ede113b2ceacd1d5883defb701bfddf287dfddafb95354dee332a6afe6a9efe3386157a96f