Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 07:07
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-25_f78c2e07561a1e9618e79ba9044dd2aa_cryptolocker.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-25_f78c2e07561a1e9618e79ba9044dd2aa_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-25_f78c2e07561a1e9618e79ba9044dd2aa_cryptolocker.exe
-
Size
49KB
-
MD5
f78c2e07561a1e9618e79ba9044dd2aa
-
SHA1
7371e7f9c37e170af0314b2aee8cc249a6d4b92a
-
SHA256
a946b243498f6ebfb1d63d04e2735d0900ac41bb75ba5f3b00ef005e25db89ae
-
SHA512
83d83fc605994cb5ef0dce9ea37ac0c794cc334d51f7b7af544fb23ce598c655b72193ab1b122aab4f7a67010a91762f3590c37af395be3bd2d8cdf005ab1e1d
-
SSDEEP
768:P6LsoVEeegiZPvEhHSP+gp/QtOOtEvwDpjBBMLZdzuqpXsiE8Wq/DpkcBJU:P6Q0ElP6G+gJQMOtEvwDpjB8WMlfc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2984 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1544 2024-08-25_f78c2e07561a1e9618e79ba9044dd2aa_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-25_f78c2e07561a1e9618e79ba9044dd2aa_cryptolocker.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2984 1544 2024-08-25_f78c2e07561a1e9618e79ba9044dd2aa_cryptolocker.exe 31 PID 1544 wrote to memory of 2984 1544 2024-08-25_f78c2e07561a1e9618e79ba9044dd2aa_cryptolocker.exe 31 PID 1544 wrote to memory of 2984 1544 2024-08-25_f78c2e07561a1e9618e79ba9044dd2aa_cryptolocker.exe 31 PID 1544 wrote to memory of 2984 1544 2024-08-25_f78c2e07561a1e9618e79ba9044dd2aa_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-25_f78c2e07561a1e9618e79ba9044dd2aa_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-25_f78c2e07561a1e9618e79ba9044dd2aa_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5f510d56518058ed986e5ec0ce7fd4ee7
SHA184184139f3ed0b90ca547698dc93a168c6b0e1de
SHA2565448be7d1049aa7537bff8f3f332e4b9bd055ba949267078dbc8aa8a13cb1485
SHA5123e5e1c03c8e279985a3a8e44e234db94634c304eb887dd312aabc236c8c88f5cd4dfa3b3463336d7e8e174d50cf9005f1e328241ce52adcfeb84cf53d3285f28