Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 02:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-06_13fdf451843363d71b0fac782f3ac879_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-06_13fdf451843363d71b0fac782f3ac879_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-06_13fdf451843363d71b0fac782f3ac879_cryptolocker.exe
-
Size
46KB
-
MD5
13fdf451843363d71b0fac782f3ac879
-
SHA1
9edb642936c2161701c6ead6f317578e211c9507
-
SHA256
9225b6ecf993b3e54619206a830b4b8fd854790eae030dcdf27fa169a8c5858d
-
SHA512
4b0d9a42c1227fe537a41bac5f8be8e00341ebc33cc30055e34a6af0cd4b042fc9f7e3636d5b9baf266b41505a91dc7060c98c801c7c1e53cb024c8b5eb063b2
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/aMDh:6j+1NMOtEvwDpjrRrt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1936 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2568 2024-09-06_13fdf451843363d71b0fac782f3ac879_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-06_13fdf451843363d71b0fac782f3ac879_cryptolocker.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2568 wrote to memory of 1936 2568 2024-09-06_13fdf451843363d71b0fac782f3ac879_cryptolocker.exe 30 PID 2568 wrote to memory of 1936 2568 2024-09-06_13fdf451843363d71b0fac782f3ac879_cryptolocker.exe 30 PID 2568 wrote to memory of 1936 2568 2024-09-06_13fdf451843363d71b0fac782f3ac879_cryptolocker.exe 30 PID 2568 wrote to memory of 1936 2568 2024-09-06_13fdf451843363d71b0fac782f3ac879_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-06_13fdf451843363d71b0fac782f3ac879_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-06_13fdf451843363d71b0fac782f3ac879_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD532ec0897590254294ee376d911d8732c
SHA163f2b66d9618b44cc8fb81d4f2669960cc696b8d
SHA2561a0be1e5fe98ecbea3c27ae26935af78e9c7b6766ba9ccc7b159872beeb69b9c
SHA512fa833f87fab9c7ba1a61666ce52ef762cebd55c7dac06a88a649851c603d719d8ff5aefd4f0b3adeca1d2e009937e1d5c0a8421c866cdaab26af258530e9fa54