Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 00:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-06_a0de0f709b02e6e104b48a88aa47e807_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-06_a0de0f709b02e6e104b48a88aa47e807_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-06_a0de0f709b02e6e104b48a88aa47e807_cryptolocker.exe
-
Size
40KB
-
MD5
a0de0f709b02e6e104b48a88aa47e807
-
SHA1
e1210e5ed862cb11e696c87874c1d2970f77bee0
-
SHA256
987a9d931ebdad2096efeecd26ab083956500048fbaf5b1fdbc7b5a99815a706
-
SHA512
268f7c8adbef2c5209ef4b76b59443cbf64b753f7dc807bb247d8e0c3fac2daeb339bd14e5abbfa7d39e366a92e6c5329c6d40f6178df7b059ed965958f41d4e
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLeJAsKuD+V:ZzFbxmLPWQMOtEvwDpjLeJAsKcQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3056 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1868 2024-09-06_a0de0f709b02e6e104b48a88aa47e807_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-06_a0de0f709b02e6e104b48a88aa47e807_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1868 wrote to memory of 3056 1868 2024-09-06_a0de0f709b02e6e104b48a88aa47e807_cryptolocker.exe 31 PID 1868 wrote to memory of 3056 1868 2024-09-06_a0de0f709b02e6e104b48a88aa47e807_cryptolocker.exe 31 PID 1868 wrote to memory of 3056 1868 2024-09-06_a0de0f709b02e6e104b48a88aa47e807_cryptolocker.exe 31 PID 1868 wrote to memory of 3056 1868 2024-09-06_a0de0f709b02e6e104b48a88aa47e807_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-06_a0de0f709b02e6e104b48a88aa47e807_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-06_a0de0f709b02e6e104b48a88aa47e807_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5c1bbdb588564374137e53b0ca040161a
SHA102dead48aa1b4406adb8d2fa00ec2b31a409b767
SHA2566c4ab0c935b1dc0ae97119ca3e1214881db4d7c5b6a0bb4c456793ec0456696d
SHA5125fe7175d4bffe286f8518ae04943b228874117be05b493f8a663118d7128fa4ffa80cc1668b60d41499d0fb778bb1ac13a5577a4c585e343bebe1b066e9b86e6