Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 03:26
Behavioral task
behavioral1
Sample
2024-09-09_3a4d619c6e633ffe1194d2d1fb9b9afc_cryptolocker.exe
Resource
win7-20240708-en
General
-
Target
2024-09-09_3a4d619c6e633ffe1194d2d1fb9b9afc_cryptolocker.exe
-
Size
40KB
-
MD5
3a4d619c6e633ffe1194d2d1fb9b9afc
-
SHA1
0b8c56c8374a4a1046a46a83a80ef8f320e931fd
-
SHA256
a0cbe2315e0bf151524e3497f0372b0da902d556c65c6822668c5984d94fcc5f
-
SHA512
3c3e1d3dcf55f2135e57d5b70ddc27351faef2476f535ac24a47dbe9fa24f0d6c281444c1ff2cc179f04a46f39103c123004dc70ed6b1804c9d22babf7a78ccc
-
SSDEEP
768:qTVbxjgQNQXtckstOOtEvwDpjAaD3TUogs/VXpAPWRi8:qTJu9cvMOtEvwDpjppVXzRV
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation 2024-09-09_3a4d619c6e633ffe1194d2d1fb9b9afc_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 868 asih.exe -
resource yara_rule behavioral2/memory/4384-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/files/0x000900000002346b-13.dat upx behavioral2/memory/4384-17-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/868-26-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-09_3a4d619c6e633ffe1194d2d1fb9b9afc_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4384 wrote to memory of 868 4384 2024-09-09_3a4d619c6e633ffe1194d2d1fb9b9afc_cryptolocker.exe 85 PID 4384 wrote to memory of 868 4384 2024-09-09_3a4d619c6e633ffe1194d2d1fb9b9afc_cryptolocker.exe 85 PID 4384 wrote to memory of 868 4384 2024-09-09_3a4d619c6e633ffe1194d2d1fb9b9afc_cryptolocker.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-09_3a4d619c6e633ffe1194d2d1fb9b9afc_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-09_3a4d619c6e633ffe1194d2d1fb9b9afc_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD543f4ba4831f3be638b0e653d0dab7759
SHA180282ba5709ccd566c1bf5cec099d04f3975eb90
SHA2568a8f2834cb9000c332235fb98184d645047f4631c2330a59375fc813f1099a7f
SHA512edba6d704667f456292ccea39e546223c741dad86fd55d5a3d035ddbafa4f384ad8a5f71209fe5d7d0be548d1243df96b1dd2cb4e661ea76595648b2c4a86e94