Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-06_701f2ac6b2e179f780bce7ef30118faa_cryptolocker.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-06_701f2ac6b2e179f780bce7ef30118faa_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-06_701f2ac6b2e179f780bce7ef30118faa_cryptolocker.exe
-
Size
73KB
-
MD5
701f2ac6b2e179f780bce7ef30118faa
-
SHA1
47d6873de2e868103216c68912ef6781660181ef
-
SHA256
0771eca5b75f85382422a13b6216477254db82563b4fff4f988910480a089ecb
-
SHA512
802190d8b5a07ffd814107d855c95591d07d10c9f31c9991f5eca4f0df25e37df52e9032f44a0c6923026d93fb3e16a15ef21ff60e39fff60b4fa55ebdf008fa
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4ZPsED3VK2+ZtyOjgO4r9vFAg2rq2g1B/RS:vj+jsMQMOtEvwDpj5HZYTjipvF24pQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 632 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1944 2024-08-06_701f2ac6b2e179f780bce7ef30118faa_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-06_701f2ac6b2e179f780bce7ef30118faa_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1944 wrote to memory of 632 1944 2024-08-06_701f2ac6b2e179f780bce7ef30118faa_cryptolocker.exe 31 PID 1944 wrote to memory of 632 1944 2024-08-06_701f2ac6b2e179f780bce7ef30118faa_cryptolocker.exe 31 PID 1944 wrote to memory of 632 1944 2024-08-06_701f2ac6b2e179f780bce7ef30118faa_cryptolocker.exe 31 PID 1944 wrote to memory of 632 1944 2024-08-06_701f2ac6b2e179f780bce7ef30118faa_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-06_701f2ac6b2e179f780bce7ef30118faa_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-06_701f2ac6b2e179f780bce7ef30118faa_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD56a2527f3d5a76a5bce620e8930529c4c
SHA1f6fecc37739d0d76fbd58b13b66c8c503d25d0c4
SHA25663d1d710f326acb9abd52bdcadeab2e4ca76537b6fd44d2b0791dedc87bf1876
SHA5120cad9379f3d4317494608e92d280bd6fdb746d8835bfa8341a6db56bb28488ff29fd787efb7168d664b649d2eec5d6867a40d6e81f8d57334b007518e7ae8509