Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_639fe7734941d7a4e21d4059b4240951_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-19_639fe7734941d7a4e21d4059b4240951_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_639fe7734941d7a4e21d4059b4240951_cryptolocker.exe
-
Size
72KB
-
MD5
639fe7734941d7a4e21d4059b4240951
-
SHA1
9ffcba76c51173f07ff82911db7210ca0584ef22
-
SHA256
9dbef0f33a320e1215d3521346ee9cb6f7beb1a19083567ba3ee036b260ef8bd
-
SHA512
8002dd03975b8fd3bae36b286f7e8b976ce51b87e3d6ebd8946ad2a2b1f0abddedf8584ebf75f7dfb13cc3a8b5060e8868795e38461c867c9c3153beef2fdaf0
-
SSDEEP
1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKUNZO5k:DW60sllyWOtEvwDpjwF85V
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation 2024-09-19_639fe7734941d7a4e21d4059b4240951_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 832 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_639fe7734941d7a4e21d4059b4240951_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4396 wrote to memory of 832 4396 2024-09-19_639fe7734941d7a4e21d4059b4240951_cryptolocker.exe 81 PID 4396 wrote to memory of 832 4396 2024-09-19_639fe7734941d7a4e21d4059b4240951_cryptolocker.exe 81 PID 4396 wrote to memory of 832 4396 2024-09-19_639fe7734941d7a4e21d4059b4240951_cryptolocker.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_639fe7734941d7a4e21d4059b4240951_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_639fe7734941d7a4e21d4059b4240951_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5854078af085a64573a4719c3cd166846
SHA14d8822e408f6cf4d652cfc6b4f429349b6ed1721
SHA256fb6adb6b51fd11d8c8595ded6728189eb80cd3b6d2ac00f1ddaf145e6759f62a
SHA512582381270f161c527c44a423f9b75e694d83267ff83f27d3d85c1b5649338585967761c6c768988aa408597d1f0f4a7f1ef4d25369a958b278c70323fbd5f59e