Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2024, 05:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-06_5cd1710471c1c78264f49b1b92686b1c_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-10-06_5cd1710471c1c78264f49b1b92686b1c_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-06_5cd1710471c1c78264f49b1b92686b1c_cryptolocker.exe
-
Size
76KB
-
MD5
5cd1710471c1c78264f49b1b92686b1c
-
SHA1
6cbd0c73bab04ea16af1a74dcf642eb2daf102ad
-
SHA256
61acafc93bf80e4430eb53dc84b59e598950f4a471ecabc543be2d2b0c8cbecb
-
SHA512
df9f8b6e6a4c53502819cd57eec3b6dc2194dc38fe6ced84d779c36134fdd0d487dad8498aa2c8c0e1bfb8d1958f3e94b34f876dd542ba9cbca1e77e5d2577cb
-
SSDEEP
768:u6LsoEEeegiZPvEhHSG+gZgtOOtEvwDpjeY10Y/YMsMXj:u6QFElP6n+gWMOtEvwDpjJGYQb+j
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 2024-10-06_5cd1710471c1c78264f49b1b92686b1c_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4796 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-06_5cd1710471c1c78264f49b1b92686b1c_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3464 wrote to memory of 4796 3464 2024-10-06_5cd1710471c1c78264f49b1b92686b1c_cryptolocker.exe 81 PID 3464 wrote to memory of 4796 3464 2024-10-06_5cd1710471c1c78264f49b1b92686b1c_cryptolocker.exe 81 PID 3464 wrote to memory of 4796 3464 2024-10-06_5cd1710471c1c78264f49b1b92686b1c_cryptolocker.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-06_5cd1710471c1c78264f49b1b92686b1c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-06_5cd1710471c1c78264f49b1b92686b1c_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5d5e2c9fa826f5ab699ff4641a3a158b8
SHA184b0ca4871b44fafad60729c90a36e3c6068c4e2
SHA256862c545ac875527b7e7924420aa01c123aa0721d5c2a414b7aa307a119ec5fa1
SHA51232cb5199e972cade1bb6ce355857568cda772a1ec9ce37277c8fec01f181c3506f4f780d9c1a0b1c3717f5f5732e4de9bdf2e82b4e7420160458ae86207750be