Analysis
-
max time kernel
132s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 18:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-05_472fbe0eeebcfec13874f5c52ed4b3d4_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-05_472fbe0eeebcfec13874f5c52ed4b3d4_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-05_472fbe0eeebcfec13874f5c52ed4b3d4_cryptolocker.exe
-
Size
77KB
-
MD5
472fbe0eeebcfec13874f5c52ed4b3d4
-
SHA1
e40ef75a1e8933189a933406cb9564dc70fa5df6
-
SHA256
ee1ec3fe4d1affa0f620bc59261d4b29e0be67d7ea9938ef729b62d299c43e39
-
SHA512
4177063fb995b3f703229f69ce272b8afba858c0f17bdd1414f2fd9df11bb62c223f8d8da766c0418ada143c7f946e23b79776600f8c7faadceacc91e2b9bee0
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1rHs/:X6a+SOtEvwDpjBZYvQd2Y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3060 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1620 2024-09-05_472fbe0eeebcfec13874f5c52ed4b3d4_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-05_472fbe0eeebcfec13874f5c52ed4b3d4_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 3060 1620 2024-09-05_472fbe0eeebcfec13874f5c52ed4b3d4_cryptolocker.exe 30 PID 1620 wrote to memory of 3060 1620 2024-09-05_472fbe0eeebcfec13874f5c52ed4b3d4_cryptolocker.exe 30 PID 1620 wrote to memory of 3060 1620 2024-09-05_472fbe0eeebcfec13874f5c52ed4b3d4_cryptolocker.exe 30 PID 1620 wrote to memory of 3060 1620 2024-09-05_472fbe0eeebcfec13874f5c52ed4b3d4_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-05_472fbe0eeebcfec13874f5c52ed4b3d4_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-05_472fbe0eeebcfec13874f5c52ed4b3d4_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD512079895d0df6a953760a5ddde3e5d06
SHA13bb554ee161f422310d0b227f6ed1e0693bda096
SHA256bdcfc29f5b93ec504dd0c92ccb423f83b2345f2c2dbecb54d488e7c47d6387fa
SHA512c1a46899d4d06597e41787aae8d9631f57363458b482c27685e730a61d90154be4f70cf179e4d634a542aeffd9dcb1e3090ef6443a15a87ab9296d72d1490528