Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-23_c90f2765ceeb373f301c721948977785_cryptolocker.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-23_c90f2765ceeb373f301c721948977785_cryptolocker.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-23_c90f2765ceeb373f301c721948977785_cryptolocker.exe
-
Size
51KB
-
MD5
c90f2765ceeb373f301c721948977785
-
SHA1
a9dd9daeb38569500f4b16df938f54136f13746b
-
SHA256
c7a2050458f91b6c9821437ecf4c8362624b7fed29367fba0e40d765bdaff05c
-
SHA512
0eb10d2ebaabab433d56a768b3093303d52e2387bf73b5c18ef9d1e03b9636001bd042831eba27fa87e0672974cd07c81f6aea1a63c844318e63e01c5725d164
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4/Uth8igNrr42A7n0FmB0nT:vj+jsMQMOtEvwDpj5HczerLO04B4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2404 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 3012 2024-07-23_c90f2765ceeb373f301c721948977785_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-07-23_c90f2765ceeb373f301c721948977785_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2404 3012 2024-07-23_c90f2765ceeb373f301c721948977785_cryptolocker.exe 30 PID 3012 wrote to memory of 2404 3012 2024-07-23_c90f2765ceeb373f301c721948977785_cryptolocker.exe 30 PID 3012 wrote to memory of 2404 3012 2024-07-23_c90f2765ceeb373f301c721948977785_cryptolocker.exe 30 PID 3012 wrote to memory of 2404 3012 2024-07-23_c90f2765ceeb373f301c721948977785_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-23_c90f2765ceeb373f301c721948977785_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-23_c90f2765ceeb373f301c721948977785_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD52f522d8a6b6f10320126ba4a64cf9c4c
SHA1ae3e8a6b211261fc34f5c290f93cec0c18ba4889
SHA25656cdeaf278dd826e0d7ff4b04bb38a78ae2d11b03fa6c4d08261b4a303e2cf99
SHA512c54c825321d65d61c00b463a9c5750ca52b9ce468757abbbf8cfa9c079f6add317d4a80dbb452b1c620f639ab5b69b3b56685dc0a1748ebd289e65fc1659582e