Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 02:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-28_e437602cf158586bade33244c3dddc07_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-28_e437602cf158586bade33244c3dddc07_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-28_e437602cf158586bade33244c3dddc07_cryptolocker.exe
-
Size
35KB
-
MD5
e437602cf158586bade33244c3dddc07
-
SHA1
f2b2d0a720e0fcf402c2fb9e7cdf88f24a18e23e
-
SHA256
90e7b093d977d59acdd4d2ae22d95c575551219450a898d418d813ccbf2c409a
-
SHA512
62200698be2f0e83b3231a91378a70683ea2e4ab4e690e6f856e500b5e6a1c15f1a316cd34c2454bd467c81dbefa4252702882b94566af770fdd67243149c495
-
SSDEEP
768:bxNQIE0eBhkL2Fo1CCwgfjOg9Arbkzos5jmUEf:bxNrC7kYo1Fxf2rYPLEf
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation 2024-09-28_e437602cf158586bade33244c3dddc07_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3588 pissa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-28_e437602cf158586bade33244c3dddc07_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pissa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1048 wrote to memory of 3588 1048 2024-09-28_e437602cf158586bade33244c3dddc07_cryptolocker.exe 89 PID 1048 wrote to memory of 3588 1048 2024-09-28_e437602cf158586bade33244c3dddc07_cryptolocker.exe 89 PID 1048 wrote to memory of 3588 1048 2024-09-28_e437602cf158586bade33244c3dddc07_cryptolocker.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-28_e437602cf158586bade33244c3dddc07_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-28_e437602cf158586bade33244c3dddc07_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\pissa.exe"C:\Users\Admin\AppData\Local\Temp\pissa.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4276,i,10065386245627775856,6567048529106473151,262144 --variations-seed-version --mojo-platform-channel-handle=4308 /prefetch:81⤵PID:4056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5bf9b4c92dfdc961efbe28a9235a176a6
SHA16a9b181dfaecd8d431fc69d76a76b9ca0e53da04
SHA2569ddbd58100eac75e5544ccbbb886b8847cf7d8d403d8c5d267ec43caf42c5ba4
SHA51268f8b4f038f21cb5a566403cd0098463a370761e2abeabb5eb92a8a369ca9b53873e67861905ae673e6689133ab2ad482f190a3e04931081f4c8a2dcc457a63c