Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-05_541648950ee96a67bba87cf544f3cb16_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-05_541648950ee96a67bba87cf544f3cb16_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-05_541648950ee96a67bba87cf544f3cb16_cryptolocker.exe
-
Size
43KB
-
MD5
541648950ee96a67bba87cf544f3cb16
-
SHA1
d350e1fdd0693906ceb6571af63f8047becf5655
-
SHA256
14213dbade7155992b7160d3d82c68aeb54d541905b7194407e2d3296f8806a4
-
SHA512
09dd10c8421784fcb96df7198c90669a599b35cfd58dec7dd389161c9973b517f204940b833463b83c8e4dc2dfdec8696345fe908c54cdf2d63dc32c8c5b62f5
-
SSDEEP
768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAGa:bCDOw9aMDooc+vAGa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2944 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 2784 2024-09-05_541648950ee96a67bba87cf544f3cb16_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-05_541648950ee96a67bba87cf544f3cb16_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lossy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2944 2784 2024-09-05_541648950ee96a67bba87cf544f3cb16_cryptolocker.exe 30 PID 2784 wrote to memory of 2944 2784 2024-09-05_541648950ee96a67bba87cf544f3cb16_cryptolocker.exe 30 PID 2784 wrote to memory of 2944 2784 2024-09-05_541648950ee96a67bba87cf544f3cb16_cryptolocker.exe 30 PID 2784 wrote to memory of 2944 2784 2024-09-05_541648950ee96a67bba87cf544f3cb16_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-05_541648950ee96a67bba87cf544f3cb16_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-05_541648950ee96a67bba87cf544f3cb16_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD594c085c85573359f4ae09f762df9b04e
SHA14c7875e35b08a77c1d7c71ca98762e63d4cd39f9
SHA256533441d499402ea085846cc18eae37430492ee54b1dfae2e2623ae51a9f97c9c
SHA5125d84f702c0f6a3b8684e222810873f304c0aee226dc51636a2f82848be39274357fd3014e8b77e3cb1c86ed7b69e8b2e382834b9f1a43fad51158f3ff30fbaaf