Analysis
-
max time kernel
134s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:18
Behavioral task
behavioral1
Sample
2024-09-05_f483db3db47af437da6fb88545425639_cryptolocker.exe
Resource
win7-20240708-en
General
-
Target
2024-09-05_f483db3db47af437da6fb88545425639_cryptolocker.exe
-
Size
82KB
-
MD5
f483db3db47af437da6fb88545425639
-
SHA1
f3c26d883568746cbf806409ee2c3b11e743da3f
-
SHA256
6c12068b444c60aba456ce24f3af0f9c87de0a474bad743d61c621487a7dff2c
-
SHA512
79d114a2b6a2d5abeafce51d18959834c2105d47a16e466b3ed6860030cd3a1b62a8b9a3e5b245c41bbbbc2c50c3febeba63cbae9508e96e711fb9fd76296ebd
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Qil:zCsanOtEvwDpji
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3032 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 3012 2024-09-05_f483db3db47af437da6fb88545425639_cryptolocker.exe -
resource yara_rule behavioral1/memory/3012-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x00090000000120fb-11.dat upx behavioral1/memory/3012-14-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/3032-25-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-05_f483db3db47af437da6fb88545425639_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 3032 3012 2024-09-05_f483db3db47af437da6fb88545425639_cryptolocker.exe 30 PID 3012 wrote to memory of 3032 3012 2024-09-05_f483db3db47af437da6fb88545425639_cryptolocker.exe 30 PID 3012 wrote to memory of 3032 3012 2024-09-05_f483db3db47af437da6fb88545425639_cryptolocker.exe 30 PID 3012 wrote to memory of 3032 3012 2024-09-05_f483db3db47af437da6fb88545425639_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-05_f483db3db47af437da6fb88545425639_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-05_f483db3db47af437da6fb88545425639_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5c96f5752ebf26ab43d5d8ddb95419746
SHA143437d315f5ee12c2851e70ea2e80e3c4ec41f09
SHA256c338a4f4a3ceb30ffb85b813ce8b5923570a108154482f78daedc5ec845a6a96
SHA512c170667b8b4b2e71e2077310a34c2d210eb430885bd5c02eee7376d126c1b83d851efebb743729d39d0e6b7c99f6a4439145d600fd578af6056b2f71bf301555