Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 13:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-13_375bdd254fed4641fcd1f5128419cf32_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-13_375bdd254fed4641fcd1f5128419cf32_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-13_375bdd254fed4641fcd1f5128419cf32_cryptolocker.exe
-
Size
31KB
-
MD5
375bdd254fed4641fcd1f5128419cf32
-
SHA1
2bea8e9736cfc2ac76197a68eb657b029f1fa59c
-
SHA256
af591abef343424300d48bc9d980d47321ba381431d58b719bbb1a9df940698e
-
SHA512
572e25808ce98223fe1d9617d13a3f6a2b664f81ef7c69b75c46046100a187bbda68a699ef299d6d6007ff79e900641ce0d0ce72eb729ed2dbb7580598b702ce
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBjb1mm:X6QFElP6n+gJQMOtEvwDpjBnEm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 2024-10-13_375bdd254fed4641fcd1f5128419cf32_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 764 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-13_375bdd254fed4641fcd1f5128419cf32_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4024 wrote to memory of 764 4024 2024-10-13_375bdd254fed4641fcd1f5128419cf32_cryptolocker.exe 86 PID 4024 wrote to memory of 764 4024 2024-10-13_375bdd254fed4641fcd1f5128419cf32_cryptolocker.exe 86 PID 4024 wrote to memory of 764 4024 2024-10-13_375bdd254fed4641fcd1f5128419cf32_cryptolocker.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_375bdd254fed4641fcd1f5128419cf32_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-13_375bdd254fed4641fcd1f5128419cf32_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5d63bc9e00c900677e8c2dd8cf93b498f
SHA12b5fdcbeed72fb74664a537fe64f30ec49a72ca0
SHA256248dfd73415fdc552b5e6fc2da6e19274290ad9ab6389971fb8beb0f2d401090
SHA512d9152448fd13fac6dbaf6ee3a014b5382a18d143b4bf4b84f784c486c77d5685ca576fe36e667d5616ac27e1a229491af0a229fa76914ae89103370a630c961c