Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2024 07:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-05_982be96edfc8fb874e88d5d43cf26caa_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-05_982be96edfc8fb874e88d5d43cf26caa_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-05_982be96edfc8fb874e88d5d43cf26caa_cryptolocker.exe
-
Size
43KB
-
MD5
982be96edfc8fb874e88d5d43cf26caa
-
SHA1
12f3e262e1bbf265c564bae83a8c7890157031b9
-
SHA256
def89fca09acd991badc7a1aa2496d207dad7ac86ed56ee73ff3ade241e550c8
-
SHA512
9f86d129b409d6933d7652985117d9ac5dfe2ab8fabba238a77f633a06d294bd46fa840355cfcf38d44877605dbca4bb8cd313fb936fca75e02bd8e52a1b38d9
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaac4HK/wSvuQTCyD/95R:X6QFElP6n+gJQMOtEvwDpjBsYK/fbDF/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 2024-10-05_982be96edfc8fb874e88d5d43cf26caa_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2720 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-05_982be96edfc8fb874e88d5d43cf26caa_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3472 wrote to memory of 2720 3472 2024-10-05_982be96edfc8fb874e88d5d43cf26caa_cryptolocker.exe 82 PID 3472 wrote to memory of 2720 3472 2024-10-05_982be96edfc8fb874e88d5d43cf26caa_cryptolocker.exe 82 PID 3472 wrote to memory of 2720 3472 2024-10-05_982be96edfc8fb874e88d5d43cf26caa_cryptolocker.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-05_982be96edfc8fb874e88d5d43cf26caa_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-05_982be96edfc8fb874e88d5d43cf26caa_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5ed189b1c1232916bcd0fd34b63ee9e1f
SHA11789395b1baab57afc243faf42d5b18ec4ccf8ba
SHA2563578ca004c0c453b0c675b917d63de557efad35bee86f078f76131b62957ecb1
SHA512775b35ccf45081f16229ff41e6b57140f005c0bf57420eebf316ffe0f5efcecefae8222785e8f9d744f6d21b922811144dd8cf0dfc5f2fa9e76c736b713a94e2