Analysis
-
max time kernel
132s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:13
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-05_b3bc1b205877eb2aaaaebbe6ffc0f6d9_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-05_b3bc1b205877eb2aaaaebbe6ffc0f6d9_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-05_b3bc1b205877eb2aaaaebbe6ffc0f6d9_cryptolocker.exe
-
Size
37KB
-
MD5
b3bc1b205877eb2aaaaebbe6ffc0f6d9
-
SHA1
e47dd15128a021ec66405d469a8dae4848c546be
-
SHA256
08d596517592e1600dfe38413b2dba72ce599ac10114552cc8c278302a7c3cf0
-
SHA512
256eda76c32e71d7813024ce292abfb5b5ad087b45a5f518d59a65ff776909f7189193ad707b2443fa06f580ae477fc1990d07bd50d581a2e854ea49caf97272
-
SSDEEP
768:b7o/2n1TCraU6GD1a4X0WcO+wMVm+slAMI:bc/y2lkF0+BD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2276 rewok.exe -
Loads dropped DLL 1 IoCs
pid Process 2104 2024-09-05_b3bc1b205877eb2aaaaebbe6ffc0f6d9_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-05_b3bc1b205877eb2aaaaebbe6ffc0f6d9_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rewok.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2104 2024-09-05_b3bc1b205877eb2aaaaebbe6ffc0f6d9_cryptolocker.exe 2276 rewok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2276 2104 2024-09-05_b3bc1b205877eb2aaaaebbe6ffc0f6d9_cryptolocker.exe 30 PID 2104 wrote to memory of 2276 2104 2024-09-05_b3bc1b205877eb2aaaaebbe6ffc0f6d9_cryptolocker.exe 30 PID 2104 wrote to memory of 2276 2104 2024-09-05_b3bc1b205877eb2aaaaebbe6ffc0f6d9_cryptolocker.exe 30 PID 2104 wrote to memory of 2276 2104 2024-09-05_b3bc1b205877eb2aaaaebbe6ffc0f6d9_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-05_b3bc1b205877eb2aaaaebbe6ffc0f6d9_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-05_b3bc1b205877eb2aaaaebbe6ffc0f6d9_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD59ceb5c6e5b71e4b38aa5bfaf38834ed8
SHA18875a1e09f7686e797512b93b7b38f3016fddb55
SHA25604ef47474b239bea9e0f41d37f711d26d9808fd5979072029d1a2f603ebc393e
SHA512f07195593e9c600fac38585323bd49cbf572653e92f84a671d364e031e6735f34fd8ce08bfffd74e7d99d7675dbe60011b6b36d19eeeee4b4074207e9b95ff01