Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-05_fa36b5405f838ba0504482961b0320e0_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-05_fa36b5405f838ba0504482961b0320e0_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-05_fa36b5405f838ba0504482961b0320e0_cryptolocker.exe
-
Size
43KB
-
MD5
fa36b5405f838ba0504482961b0320e0
-
SHA1
928d5245b510cf2661f2b6b8763bb12a0e90199c
-
SHA256
5786cb3657c7e96247fc0d2218e7daa9ec5824ae4a99f4ecbe6bfae993fcc83d
-
SHA512
7ef164ae1d3fea069c45a2bb4e59b7bff034c29f4668c1d069266e3f124650a9b7192a349581bb6ab72dba718bd970649a76a03aab571734710c684abe8da1af
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaac4HK/wSvuQTCyD/954:X6QFElP6n+gJQMOtEvwDpjBsYK/fbDFy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 2024-09-05_fa36b5405f838ba0504482961b0320e0_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 1320 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-05_fa36b5405f838ba0504482961b0320e0_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2376 wrote to memory of 1320 2376 2024-09-05_fa36b5405f838ba0504482961b0320e0_cryptolocker.exe 86 PID 2376 wrote to memory of 1320 2376 2024-09-05_fa36b5405f838ba0504482961b0320e0_cryptolocker.exe 86 PID 2376 wrote to memory of 1320 2376 2024-09-05_fa36b5405f838ba0504482961b0320e0_cryptolocker.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-05_fa36b5405f838ba0504482961b0320e0_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-05_fa36b5405f838ba0504482961b0320e0_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD55c3af024edbd911ed9af262a6af63af8
SHA1f25733c4cc9f797fa0e5b8d1a2a460f4a7abcb3d
SHA256017be7a31a3e6d0284b3492a91b59807d039c75f06a70e60eba130b17754252a
SHA512fc77f9df2110aff91fa912c23e91471aca8f6df438ef6faa5aef545a53357409593dc4f59244e075a23133eba3414780fdb94c4ec1503df7979db66aa3cec6f1