Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-18_58913ed42db3b49614c21726b04e5a3e_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-18_58913ed42db3b49614c21726b04e5a3e_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-18_58913ed42db3b49614c21726b04e5a3e_cryptolocker.exe
-
Size
46KB
-
MD5
58913ed42db3b49614c21726b04e5a3e
-
SHA1
bfe48c34e4b8850b04a11e34b5ea29cb2f004ebc
-
SHA256
8b0847a596ab8b6ae69cf3f5ca297b725f40f7b72b587c0285cc534a498b5538
-
SHA512
ff8a5f16f033e5a8ff860667d77a5c7b5acb55261236ace758dd4f6e4eac316b75c01735ca2bd7b7547ee9b143c40da49ef70ec84db1e52c32f25390fa282d24
-
SSDEEP
384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jb0nrlwfjDUknqcGY:bm74zYcgT/EkM0ryfjdnqcGY
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2024-10-18_58913ed42db3b49614c21726b04e5a3e_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 1436 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-18_58913ed42db3b49614c21726b04e5a3e_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hasfj.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1868 wrote to memory of 1436 1868 2024-10-18_58913ed42db3b49614c21726b04e5a3e_cryptolocker.exe 87 PID 1868 wrote to memory of 1436 1868 2024-10-18_58913ed42db3b49614c21726b04e5a3e_cryptolocker.exe 87 PID 1868 wrote to memory of 1436 1868 2024-10-18_58913ed42db3b49614c21726b04e5a3e_cryptolocker.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-18_58913ed42db3b49614c21726b04e5a3e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-18_58913ed42db3b49614c21726b04e5a3e_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5e84d6a2f8a9f0bf6d303f51629db0862
SHA1465287ebe33950d0a3f87bdab84b529cdae17433
SHA256ec0eaff0dc989556b82eaf678aafd6c97c830e516ebcd27d48470d836337680f
SHA51232bc292337b8515b487c00e955d72dcaa03ffa188bbbff59b745c135e5e019e9adc35ee4ae4119d7379b842c336be49bd09131d4e643597f9cb80f0905efa556