Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 06:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-24_3011233914882d7f6b20758fa54dec25_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-24_3011233914882d7f6b20758fa54dec25_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-24_3011233914882d7f6b20758fa54dec25_cryptolocker.exe
-
Size
34KB
-
MD5
3011233914882d7f6b20758fa54dec25
-
SHA1
1eee58e434fd0d4b9e6a2425ba7494842ffd0e7e
-
SHA256
1bfcea549a51327e68168303ec4b9eeddaa5ebfb0704408f29f8b9c721f1aaed
-
SHA512
7b199f263b775cf087e74af5263ea18cf93d57b8a46bc07fcd46dca8c067cb1dc61624fd93346f0f3a39f7e4a07d2efa6093ab6fc039787aa0ac2b0da6703495
-
SSDEEP
384:bG74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUGTGOFf:bG74zYcgT/Ekd0ryfj3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2664 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2756 2024-08-24_3011233914882d7f6b20758fa54dec25_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-24_3011233914882d7f6b20758fa54dec25_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hasfj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2664 2756 2024-08-24_3011233914882d7f6b20758fa54dec25_cryptolocker.exe 30 PID 2756 wrote to memory of 2664 2756 2024-08-24_3011233914882d7f6b20758fa54dec25_cryptolocker.exe 30 PID 2756 wrote to memory of 2664 2756 2024-08-24_3011233914882d7f6b20758fa54dec25_cryptolocker.exe 30 PID 2756 wrote to memory of 2664 2756 2024-08-24_3011233914882d7f6b20758fa54dec25_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-24_3011233914882d7f6b20758fa54dec25_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-24_3011233914882d7f6b20758fa54dec25_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD592c0525c70c2ca265dde220b338948a4
SHA1d851a8d6e76823ed2d090704ecb0a188e34f9f97
SHA2561e1df5d4f63f37b365e2aeb1e38d7b9b1420e1a25f41a3d3c826ae34eb8c2dc8
SHA51285ce87a5937611a78d78a405a67213f7f0f568772fe21ceb97fb49104b56aefe4c926d6b9bff196bf2d4e45d2eac7a2ff15a1e26246e3108885d0b4825cba629