Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 05:53
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-15_b63a50ac603994a2a1649aab2bec2fb9_cryptolocker.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-10-15_b63a50ac603994a2a1649aab2bec2fb9_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-15_b63a50ac603994a2a1649aab2bec2fb9_cryptolocker.exe
-
Size
47KB
-
MD5
b63a50ac603994a2a1649aab2bec2fb9
-
SHA1
76a11fdfc095c2f098f677e795538b17d2fd6e62
-
SHA256
cebd190da2c5b1e6449e8bd6609ab35b664ae65623b41b873b8ce4fbcc91853c
-
SHA512
753d49e26e73d9cf3673206ec7fc378f8c5dfc87697a6c9e49f91f7fb6e8c7e66750de6c15de2779b1bea9dc9f286a71da9e4ccd09f3602febfd23311a006ced
-
SSDEEP
384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jb0nrlwfjDUknqfJ:bm74zYcgT/EkM0ryfjdnqh
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 2024-10-15_b63a50ac603994a2a1649aab2bec2fb9_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4604 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hasfj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-15_b63a50ac603994a2a1649aab2bec2fb9_cryptolocker.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2852 wrote to memory of 4604 2852 2024-10-15_b63a50ac603994a2a1649aab2bec2fb9_cryptolocker.exe 85 PID 2852 wrote to memory of 4604 2852 2024-10-15_b63a50ac603994a2a1649aab2bec2fb9_cryptolocker.exe 85 PID 2852 wrote to memory of 4604 2852 2024-10-15_b63a50ac603994a2a1649aab2bec2fb9_cryptolocker.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-15_b63a50ac603994a2a1649aab2bec2fb9_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-15_b63a50ac603994a2a1649aab2bec2fb9_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD58a7fae1a53a38392ec82df2e891c50f9
SHA1a501edec020d7fc4039dd16c3b441decbb24afa0
SHA256dc057dc15da18730bc90690e6acc7ab39cf86bc58b30ad0d7fe452f8f92710cc
SHA51204bc61bec540a54b5de29ceaa67e96b8514df6525488d88a09e21fad870d2b0c565a47d9fae37996274e2f8c08936c483ed185fd8d2395c39e358408c8e665d5