Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:32
Behavioral task
behavioral1
Sample
2024-09-19_eb1bcd5e6869043f4685ae587f87a6a9_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-09-19_eb1bcd5e6869043f4685ae587f87a6a9_cryptolocker.exe
-
Size
96KB
-
MD5
eb1bcd5e6869043f4685ae587f87a6a9
-
SHA1
29f913ab7a94e2873c01dc73e97667ffc903b63e
-
SHA256
9a541d40a95502211d000ec10b6d75ef6aaf7e335e06c82fb2bb850e55f3f3fe
-
SHA512
e2d950a062fd7cdec40294eaa56833ca75b68ba3954008ec88e2459d26ecdd1c017778b7644fcf3eee99003611cdc30345e6e9d1fa544a1cda889e158c02e970
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp+ofI5MN:AnBdOOtEvwDpj6zG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 2024-09-19_eb1bcd5e6869043f4685ae587f87a6a9_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2064 asih.exe -
resource yara_rule behavioral2/memory/4600-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/files/0x0003000000022ab1-13.dat upx behavioral2/memory/4600-18-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/2064-27-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_eb1bcd5e6869043f4685ae587f87a6a9_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4600 wrote to memory of 2064 4600 2024-09-19_eb1bcd5e6869043f4685ae587f87a6a9_cryptolocker.exe 84 PID 4600 wrote to memory of 2064 4600 2024-09-19_eb1bcd5e6869043f4685ae587f87a6a9_cryptolocker.exe 84 PID 4600 wrote to memory of 2064 4600 2024-09-19_eb1bcd5e6869043f4685ae587f87a6a9_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_eb1bcd5e6869043f4685ae587f87a6a9_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_eb1bcd5e6869043f4685ae587f87a6a9_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5cca398fab7bc8d7745f2ec666aa3db65
SHA1ba0faf21dbaf0571de7a5cb8fae3d7bd50f3169f
SHA256a46198884489451dd4cb68f3f61c7ffb80f6da04572bd08dccbf9d50b09994b7
SHA512b4c54f6ed1cef39eab829d00ad1d594e47c9f8f7cda121de6c95ad80d7f8bbf4b3672706992e5bbb3e5b9c7facce0fdd1e5b5f3dca2fa853f79514ddcb66e6be