Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-01_fc003330251aaeea86c216de91e74ea4_cryptolocker.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-01_fc003330251aaeea86c216de91e74ea4_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-01_fc003330251aaeea86c216de91e74ea4_cryptolocker.exe
-
Size
63KB
-
MD5
fc003330251aaeea86c216de91e74ea4
-
SHA1
06ad97032d0cddad3dc7e6b05e550765d92dc19d
-
SHA256
c9cee0d71ae4b78a7b671febb4be1f98b2bdbe4f2f0c769cc68576b327205443
-
SHA512
fa56e35cf2185721f2a95852cf234bdd24ef0c3bb0ae6bbd47a47857278e3d33ddf488ef1796893b70568121b5b7decd0506f4eaccdfbd0cfc0db6cb47efadae
-
SSDEEP
1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMNuSL:TCjsIOtEvwDpj5HE/OUHnSMZM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2128 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2072 2024-09-01_fc003330251aaeea86c216de91e74ea4_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-01_fc003330251aaeea86c216de91e74ea4_cryptolocker.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2128 2072 2024-09-01_fc003330251aaeea86c216de91e74ea4_cryptolocker.exe 30 PID 2072 wrote to memory of 2128 2072 2024-09-01_fc003330251aaeea86c216de91e74ea4_cryptolocker.exe 30 PID 2072 wrote to memory of 2128 2072 2024-09-01_fc003330251aaeea86c216de91e74ea4_cryptolocker.exe 30 PID 2072 wrote to memory of 2128 2072 2024-09-01_fc003330251aaeea86c216de91e74ea4_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-01_fc003330251aaeea86c216de91e74ea4_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-01_fc003330251aaeea86c216de91e74ea4_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD50a6b57948bf78e7642ad96d14f9ec4fa
SHA1ed06ff1a2ee353dc93f0c5c0784326180620b4f6
SHA256d02dd27ec0d27d98e3f10b65dbd51308af15d5fade31af85de1f71ef8a9dc468
SHA512840d87cf6502d4c8749acbc9fbbc70c5d0229b5295fa593cdb3a3742da8acd1b76a45c02f724c6ffda86121f1de3fe83b6b2448227f001ef1c887853770e3a7c