Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 06:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-07_61ed47d4ca79d677d18141e74f0593e8_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-07_61ed47d4ca79d677d18141e74f0593e8_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-07_61ed47d4ca79d677d18141e74f0593e8_cryptolocker.exe
-
Size
93KB
-
MD5
61ed47d4ca79d677d18141e74f0593e8
-
SHA1
93ffc4db7651cbdf30cda66a70be6438eff423d0
-
SHA256
005b3abd56d308a2628b1cd66949f85f8e9b2242af3cbdb30931f66c304e54b6
-
SHA512
a483ccca5a21ff99ee6f5a0a7c7fa947006be49245d23dfa450c6444fd889e525883ffcd76b0538760207ee42a8aa047ab87d1278d957a3c0e550e6e07b0d8fb
-
SSDEEP
1536:26QFElP6n+gBQMOtEvwDpjQGYQbN/PKwNCJN:26a+2OtEvwDpjtzwN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 2024-09-07_61ed47d4ca79d677d18141e74f0593e8_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4988 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_61ed47d4ca79d677d18141e74f0593e8_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3584 wrote to memory of 4988 3584 2024-09-07_61ed47d4ca79d677d18141e74f0593e8_cryptolocker.exe 83 PID 3584 wrote to memory of 4988 3584 2024-09-07_61ed47d4ca79d677d18141e74f0593e8_cryptolocker.exe 83 PID 3584 wrote to memory of 4988 3584 2024-09-07_61ed47d4ca79d677d18141e74f0593e8_cryptolocker.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_61ed47d4ca79d677d18141e74f0593e8_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-07_61ed47d4ca79d677d18141e74f0593e8_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD53f50d6b29b0187b2c0f9550cb3946675
SHA12b47aa74526d6d4d8faae2afa574b53373dfe4da
SHA25674d63c6a2b921856a607d800b4477b8259eec82a2c8d0571f939b7d7bd548f2b
SHA5121611ee13c3bb18cf91ef8dce61e7457f48c6a5fad639b97733997f7991bf3ee89de672c67ccd7e4ea6333cd2034539608ab49133d5821becf65bb1eb798cbdcf