Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 20:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-28_5a8ed8771594cc35d1d6a084f7d26286_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-28_5a8ed8771594cc35d1d6a084f7d26286_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-28_5a8ed8771594cc35d1d6a084f7d26286_cryptolocker.exe
-
Size
36KB
-
MD5
5a8ed8771594cc35d1d6a084f7d26286
-
SHA1
eb40acc053a8dcc35b02d0d4cd49a3f5b80a9a53
-
SHA256
728f4cb1370646a310b2d2aa16286916b6bfb09415c1cc41f8cff935a7f4acee
-
SHA512
385efb0bf8780c6aeb32eeb32ba05837ea4cc386e2b5783d4612feaa1b65749f94e4190618019776d49a2b7f01b8201d98fca98b8e0f4e6392ffe9668776e332
-
SSDEEP
384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf6XT+0vJsg5b5URa:bgX4zYcgTEu6QOaryfjqDlC6JFbKRa
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 2024-09-28_5a8ed8771594cc35d1d6a084f7d26286_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 1596 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-28_5a8ed8771594cc35d1d6a084f7d26286_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hasfj.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4152 wrote to memory of 1596 4152 2024-09-28_5a8ed8771594cc35d1d6a084f7d26286_cryptolocker.exe 82 PID 4152 wrote to memory of 1596 4152 2024-09-28_5a8ed8771594cc35d1d6a084f7d26286_cryptolocker.exe 82 PID 4152 wrote to memory of 1596 4152 2024-09-28_5a8ed8771594cc35d1d6a084f7d26286_cryptolocker.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-28_5a8ed8771594cc35d1d6a084f7d26286_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-28_5a8ed8771594cc35d1d6a084f7d26286_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5a9162624db53d4e4aa2768a650d9066b
SHA15ef484da76555e3c5e9d2c2a6d3fa8b1bb1d4cb9
SHA25669528793a1e5ca4d8a2c85aad98e62ef3c1066254da5e08dfdc51e335bb26efa
SHA5127cbf4192a68be660da764b2a0f102738b0d438a4001adee2ddaeb9bc10578dfbfb13597c854ccad7301daf17bfc9172d39988aa216bc144a648e55d60a43ecab