Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-03_565561359777ab107ddfeb78dbbc79e8_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-03_565561359777ab107ddfeb78dbbc79e8_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-03_565561359777ab107ddfeb78dbbc79e8_cryptolocker.exe
-
Size
48KB
-
MD5
565561359777ab107ddfeb78dbbc79e8
-
SHA1
fb022a19f857d56db1a598177393f0a732aa9ff4
-
SHA256
3d231474c4a82bcf1f63146efa9b6964907bf4a167ff088f44e9784f9ead0d1a
-
SHA512
beaff36cbf832d73f67a6ee53a1583a56d99e5bba50e6a5d074abb4bbd4cede38e888779bfe5ffe5de370acf5de4772cace5a9d48dbdf5a2162ebab91c9a1aa9
-
SSDEEP
768:79inqyNR/QtOOtEvwDpjBKccJVODvy3Z5/:79mqyNhQMOtEvwDpjBzckqX/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 2024-10-03_565561359777ab107ddfeb78dbbc79e8_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 976 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-03_565561359777ab107ddfeb78dbbc79e8_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2120 wrote to memory of 976 2120 2024-10-03_565561359777ab107ddfeb78dbbc79e8_cryptolocker.exe 82 PID 2120 wrote to memory of 976 2120 2024-10-03_565561359777ab107ddfeb78dbbc79e8_cryptolocker.exe 82 PID 2120 wrote to memory of 976 2120 2024-10-03_565561359777ab107ddfeb78dbbc79e8_cryptolocker.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-03_565561359777ab107ddfeb78dbbc79e8_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-03_565561359777ab107ddfeb78dbbc79e8_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5ae5db4c2ed0c53bfdd2835b5fcfb5ab3
SHA1ba6ce8d9861b94f6e822b22ea7823d857cf477f0
SHA2562fd8759d215b1aae678a6e6d541f51f8e0b142ed30a3b2ef99187c56f042c7b3
SHA512060963e3b199a3ef16fda96c5b3e938e12fb6db8b40070c8bb5d8c7de006f5febbed99392d5327f732148c00b52063b332e59fd7f51680d0402f51c858af2c6a