Analysis
-
max time kernel
132s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:13
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-05_b347d648b40862aa0ddb471195135b0e_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-05_b347d648b40862aa0ddb471195135b0e_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-05_b347d648b40862aa0ddb471195135b0e_cryptolocker.exe
-
Size
45KB
-
MD5
b347d648b40862aa0ddb471195135b0e
-
SHA1
9bd8a6b2436ff4a2b2f7f270091a90da10f648aa
-
SHA256
cb3ad61802bba6b22c100ce145b35f4a0ce90d2596e6ede356affc8ff8b4880a
-
SHA512
3904ade6ef81eeb2ba96651ed025793e30563888ab9f39a1535cf55859c437e1cfe744e214ff4c02a07f01d65d0a1fba25d1bcb002ae422b2fb827d95be39303
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFHuRcD9Hk9:X6QFElP6n+gJQMOtEvwDpjBmzDkWDt0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 316 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2712 2024-09-05_b347d648b40862aa0ddb471195135b0e_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-05_b347d648b40862aa0ddb471195135b0e_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 316 2712 2024-09-05_b347d648b40862aa0ddb471195135b0e_cryptolocker.exe 30 PID 2712 wrote to memory of 316 2712 2024-09-05_b347d648b40862aa0ddb471195135b0e_cryptolocker.exe 30 PID 2712 wrote to memory of 316 2712 2024-09-05_b347d648b40862aa0ddb471195135b0e_cryptolocker.exe 30 PID 2712 wrote to memory of 316 2712 2024-09-05_b347d648b40862aa0ddb471195135b0e_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-05_b347d648b40862aa0ddb471195135b0e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-05_b347d648b40862aa0ddb471195135b0e_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD50522d22134ac05fc7bf9078f4b0b4729
SHA1fd16fd2083c72ecb6f8ab39334a2c8289067acf8
SHA256d57ed36846b7f03566e4ce9eb6ab9c1aff7b38f898f3063aa492c600d4525012
SHA512f057b567ad3ec17c42dd4664c6fba4ae179c926d31531cf716d9edb65855b2d75a069c178647c57838676dd43689cf53ba81d93d705d8fb80d0a09d8fecef61b