Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 05:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-11_3fe86e9fcf6f6d40ee5ba00d8b5ac4d8_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-11_3fe86e9fcf6f6d40ee5ba00d8b5ac4d8_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-11_3fe86e9fcf6f6d40ee5ba00d8b5ac4d8_cryptolocker.exe
-
Size
86KB
-
MD5
3fe86e9fcf6f6d40ee5ba00d8b5ac4d8
-
SHA1
c6c24cab459902380c77d45edd6257c14192dbba
-
SHA256
c92406fb0847e8b3cb4d6abaadc60a4bb1416f80a168af602ced9cb1821f496a
-
SHA512
dced440efd45dff04c193a081db62fa7868e247a7280f5c2b5a5cd0cb60338aca4d6e53ca50463829a05fc35b1a488504faa973ceb373e80cc5f3751e85750b7
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjyaLccVNl6aax:V6a+pOtEvwDpjvp8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 2024-09-11_3fe86e9fcf6f6d40ee5ba00d8b5ac4d8_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4520 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-11_3fe86e9fcf6f6d40ee5ba00d8b5ac4d8_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2528 wrote to memory of 4520 2528 2024-09-11_3fe86e9fcf6f6d40ee5ba00d8b5ac4d8_cryptolocker.exe 85 PID 2528 wrote to memory of 4520 2528 2024-09-11_3fe86e9fcf6f6d40ee5ba00d8b5ac4d8_cryptolocker.exe 85 PID 2528 wrote to memory of 4520 2528 2024-09-11_3fe86e9fcf6f6d40ee5ba00d8b5ac4d8_cryptolocker.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-11_3fe86e9fcf6f6d40ee5ba00d8b5ac4d8_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-11_3fe86e9fcf6f6d40ee5ba00d8b5ac4d8_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD539c1bbc46424bbb7952f428ced0f240b
SHA1249702a6ff48c2c5255131be8e762018db8890e8
SHA25642d15718d883a2690889c40852a6bc655fa56f09027c65fe1b251288a0a9dcfd
SHA512e9e50287733f069e62c85361ea6034c3d096b6ec67bb202e0fc3de39bc4858e1f5b466cf0b3df294baee05f90b959c1205f71446371dedf593602c4f78531f97