Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-06_751d86aa1b2eb170d279c2bd431cf2ce_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-06_751d86aa1b2eb170d279c2bd431cf2ce_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-06_751d86aa1b2eb170d279c2bd431cf2ce_cryptolocker.exe
-
Size
28KB
-
MD5
751d86aa1b2eb170d279c2bd431cf2ce
-
SHA1
8470e8d095bcd19ccd90e3f927774722f93a80f4
-
SHA256
d4e24414cff1072feaaf281dec1aaa0a1b46c7492b71907aa14d651965841f7d
-
SHA512
75647707a4f0e67deb36ed94939cd4447110b349eac05404b46bd1df15c71d0bc1bed8b04e52a56ee8cb9235cb47d4bc168a0355f4fcb4c011e8e22f64aa2939
-
SSDEEP
768:jOb2gOo0mw18ae8MrQRN7DctOOtEvwDpjr:jKUog898rYMOtEvwDpjr
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 2024-09-06_751d86aa1b2eb170d279c2bd431cf2ce_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 1320 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-06_751d86aa1b2eb170d279c2bd431cf2ce_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4272 wrote to memory of 1320 4272 2024-09-06_751d86aa1b2eb170d279c2bd431cf2ce_cryptolocker.exe 85 PID 4272 wrote to memory of 1320 4272 2024-09-06_751d86aa1b2eb170d279c2bd431cf2ce_cryptolocker.exe 85 PID 4272 wrote to memory of 1320 4272 2024-09-06_751d86aa1b2eb170d279c2bd431cf2ce_cryptolocker.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-06_751d86aa1b2eb170d279c2bd431cf2ce_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-06_751d86aa1b2eb170d279c2bd431cf2ce_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5af946333109263a788e9dc1a4c8ff614
SHA19a494f596f7e5d8edabe81219986074a5271cb20
SHA2560223b16cdf360b7f0d321fa732dd40e3445912cbeef7b4b4c48cca8b1b024d7c
SHA5129a25fc8bc9a7870945ace1334e49c1fc98f17ca520e8360d537ac74a014fa8499bb00d431abde30437dd793ac0bd4e821b051bf0c4fc046d6660600d7a83fbbc