Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 10:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-03_982cfb937ea9d45b7440706a97ee3d4a_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-03_982cfb937ea9d45b7440706a97ee3d4a_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-03_982cfb937ea9d45b7440706a97ee3d4a_cryptolocker.exe
-
Size
46KB
-
MD5
982cfb937ea9d45b7440706a97ee3d4a
-
SHA1
b999a12f2dfd3d36861803dc53c5924f621d92d1
-
SHA256
5416f3c8c5cffb79836be523a2742e3795b3140afedbf9dc582cad803e55dcb5
-
SHA512
ecc1ec1add2818dff19295930555bf52fd533d63533fbe98e9489e08b56d2ade4ad784d369cf9d68f7d260e140757dfb1d3dc8616203d1a8de44bcfebab7f4f7
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/aMDZ:6j+1NMOtEvwDpjrRrl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2968 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2376 2024-09-03_982cfb937ea9d45b7440706a97ee3d4a_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-03_982cfb937ea9d45b7440706a97ee3d4a_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2968 2376 2024-09-03_982cfb937ea9d45b7440706a97ee3d4a_cryptolocker.exe 31 PID 2376 wrote to memory of 2968 2376 2024-09-03_982cfb937ea9d45b7440706a97ee3d4a_cryptolocker.exe 31 PID 2376 wrote to memory of 2968 2376 2024-09-03_982cfb937ea9d45b7440706a97ee3d4a_cryptolocker.exe 31 PID 2376 wrote to memory of 2968 2376 2024-09-03_982cfb937ea9d45b7440706a97ee3d4a_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-03_982cfb937ea9d45b7440706a97ee3d4a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-03_982cfb937ea9d45b7440706a97ee3d4a_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD513c67112a307aa5ceaa88b941af120bb
SHA11551d1480dde9c736f744e01a2eb6a1aa0738311
SHA256e150f9d4efa1c4d0546ea8bec828b90a0b8b40d1c73da14d2eb6a3f14386fc5d
SHA512e7cdf2c01495c5844396642896c8a1241b3030441e6e621bc4f4d8e3a6eea19295670586aefc19445d81b9c9a10e43a77046c0bf3233009718ed8b33279d3498