Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 03:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-15_ba47dfa4940d5446958488466d66de64_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-15_ba47dfa4940d5446958488466d66de64_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-15_ba47dfa4940d5446958488466d66de64_cryptolocker.exe
-
Size
36KB
-
MD5
ba47dfa4940d5446958488466d66de64
-
SHA1
f8d5ebb44054c7a8cff50f897cf4a6f8b0f151a4
-
SHA256
10df00ed4c37a298415b510b3e5b9f1463a37d9a470aa6f688e723b6c95b4b09
-
SHA512
9655693202b2e7d83f2e1d1e9a8f8f2dffbe29bb629d7f1bfd0d868c33a4a2c4042029f4e52ace7ab3f16b5b95e79e8840851c4ed04acd9e88ee1f367b23d09b
-
SSDEEP
768:bxNQIE0eBhkL2Fo1CCwgfjOg9Arbkzos5jmUi:bxNrC7kYo1Fxf2rYPLi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2024-10-15_ba47dfa4940d5446958488466d66de64_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 1412 pissa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-15_ba47dfa4940d5446958488466d66de64_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pissa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1552 wrote to memory of 1412 1552 2024-10-15_ba47dfa4940d5446958488466d66de64_cryptolocker.exe 85 PID 1552 wrote to memory of 1412 1552 2024-10-15_ba47dfa4940d5446958488466d66de64_cryptolocker.exe 85 PID 1552 wrote to memory of 1412 1552 2024-10-15_ba47dfa4940d5446958488466d66de64_cryptolocker.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-15_ba47dfa4940d5446958488466d66de64_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-15_ba47dfa4940d5446958488466d66de64_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\pissa.exe"C:\Users\Admin\AppData\Local\Temp\pissa.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD50ea5d4cd00af5ae913282d3522dac597
SHA149bc4beae07013ec2ff5f9ecfac5c4835072f071
SHA2567b8c1bf94fafcefc83bc1da08a1366327208851c137faeff65c1f5cef5f0353f
SHA512d6f29bb8e1a91e30f29f49f0ee5240a992b279173cfda16a92e542f76115e81e0a5c4821415e1c75228b60b5a5fa5275b72938973b7bf20ea1b64cf097c88b0b