Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-29_672f35cf55f4e4fdc310b6c50228a9f8_cryptolocker.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-29_672f35cf55f4e4fdc310b6c50228a9f8_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-29_672f35cf55f4e4fdc310b6c50228a9f8_cryptolocker.exe
-
Size
46KB
-
MD5
672f35cf55f4e4fdc310b6c50228a9f8
-
SHA1
4b61f096de12bc0d624a0f4916d4cc68091426c9
-
SHA256
982aee2d46ea4157090d07bfa90b8a40f7f79eed4d7cda3c5b42d024b3d4eae7
-
SHA512
c7aa45d028343c78606abb075b37490ee280781c248747a287769ab7cb760ff2dfb19c64614f73e61a59187e671530699cd6a06910e638a9a6e4e9ac0af8c5cd
-
SSDEEP
768:bao/2n1TCraU6GD1a4X1XOQ69zbjlAAX5e9zx:bF/y2lFizbR9Xwzx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2796 rewok.exe -
Loads dropped DLL 1 IoCs
pid Process 2080 2024-08-29_672f35cf55f4e4fdc310b6c50228a9f8_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-29_672f35cf55f4e4fdc310b6c50228a9f8_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rewok.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2080 2024-08-29_672f35cf55f4e4fdc310b6c50228a9f8_cryptolocker.exe 2796 rewok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2796 2080 2024-08-29_672f35cf55f4e4fdc310b6c50228a9f8_cryptolocker.exe 30 PID 2080 wrote to memory of 2796 2080 2024-08-29_672f35cf55f4e4fdc310b6c50228a9f8_cryptolocker.exe 30 PID 2080 wrote to memory of 2796 2080 2024-08-29_672f35cf55f4e4fdc310b6c50228a9f8_cryptolocker.exe 30 PID 2080 wrote to memory of 2796 2080 2024-08-29_672f35cf55f4e4fdc310b6c50228a9f8_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-29_672f35cf55f4e4fdc310b6c50228a9f8_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-29_672f35cf55f4e4fdc310b6c50228a9f8_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5028f43271eb5f5f0bcb923ea28f10196
SHA186ed9d5cddf1f459777f311e35202e512cd06cac
SHA256c68205a18f0a8fdf3b2f159bd6a625800df6034a4ec367a8f1794b38b1afd3d3
SHA51224e8528ad019c5c336af758ea85486e8d23410769bbc019dc4b0434c20f47564cac7b0e5036f34f2af0b195077e27426b0ee9b7d6370284fde76139cb451467c