Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 16:21
Behavioral task
behavioral1
Sample
2024-09-12_34c726f5704091aad5cd354b62e7e336_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-09-12_34c726f5704091aad5cd354b62e7e336_cryptolocker.exe
-
Size
70KB
-
MD5
34c726f5704091aad5cd354b62e7e336
-
SHA1
fae06afa1768a69d568bc7ca4df301a575fa1e1f
-
SHA256
faeeb8fb48045652d8dbe0e538d95b3df44115fabca34b33f22efec59b3b6200
-
SHA512
b5e157e662bb90ca9e2e8238c1c19ceb9f72a31f53ee483666582a2ab0cacf0f3b4db4b704e289e5267ee42351e09c60c5fc60a4e92fd1922b782c2ce50f66ff
-
SSDEEP
1536:quJu9cvMOtEvwDpjWYTjipvF2bx1PQApI0u:78SEOtEvwDpjWYvQd2Pe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 2024-09-12_34c726f5704091aad5cd354b62e7e336_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 840 asih.exe -
resource yara_rule behavioral2/memory/2108-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/files/0x0009000000023433-13.dat upx behavioral2/memory/2108-18-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/840-27-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-12_34c726f5704091aad5cd354b62e7e336_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2108 wrote to memory of 840 2108 2024-09-12_34c726f5704091aad5cd354b62e7e336_cryptolocker.exe 84 PID 2108 wrote to memory of 840 2108 2024-09-12_34c726f5704091aad5cd354b62e7e336_cryptolocker.exe 84 PID 2108 wrote to memory of 840 2108 2024-09-12_34c726f5704091aad5cd354b62e7e336_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-12_34c726f5704091aad5cd354b62e7e336_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-12_34c726f5704091aad5cd354b62e7e336_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD55b0c0925336718ab1e1c4ae451a40469
SHA1b84997455a3a0ef83f6998c7c8b9e0c1b7ecf87f
SHA2562019ed2dbf5831d829c3d824ffc049c489e917f2e68558776738ccaea3401813
SHA5129849451328db74c8783467b9e4790b6c715ded97f551cedf93b98afdc3af6a17de0856ddf24e392342fb5bd6de8140c5f2a61ac6e832594db5de7c48b56566fd