Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 08:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-06_d95c640b98c0bdb0a6d0e6f8ffcf2575_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-06_d95c640b98c0bdb0a6d0e6f8ffcf2575_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-06_d95c640b98c0bdb0a6d0e6f8ffcf2575_cryptolocker.exe
-
Size
71KB
-
MD5
d95c640b98c0bdb0a6d0e6f8ffcf2575
-
SHA1
d1aaabc3d73f970ecdcea28990dcf598fb1403dd
-
SHA256
dc183619c3a5ffbd70405e61ade9747e47d17c9de7338274bc086e91d466561d
-
SHA512
40284e4391e9f9ac7e7c89917db6d4a1bd8629814ad5c26a8259a58236d13cff349c2fba6167e01f4f8133d22499cb163ea65c1588f26624299eb403b9dcb5f4
-
SSDEEP
768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MpxRXrZSUNsYD/d8X9jO:i5nkFGMOtEvwDpjNbwQEI8UZDet6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2832 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2820 2024-09-06_d95c640b98c0bdb0a6d0e6f8ffcf2575_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-06_d95c640b98c0bdb0a6d0e6f8ffcf2575_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2832 2820 2024-09-06_d95c640b98c0bdb0a6d0e6f8ffcf2575_cryptolocker.exe 30 PID 2820 wrote to memory of 2832 2820 2024-09-06_d95c640b98c0bdb0a6d0e6f8ffcf2575_cryptolocker.exe 30 PID 2820 wrote to memory of 2832 2820 2024-09-06_d95c640b98c0bdb0a6d0e6f8ffcf2575_cryptolocker.exe 30 PID 2820 wrote to memory of 2832 2820 2024-09-06_d95c640b98c0bdb0a6d0e6f8ffcf2575_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-06_d95c640b98c0bdb0a6d0e6f8ffcf2575_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-06_d95c640b98c0bdb0a6d0e6f8ffcf2575_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD58e042abe226a18c29a626815a4b012d8
SHA17ae0fecf33fd1046ee56b9b9c2f771ff0f6eb1bf
SHA256a6dc88404ece205406ae55f6bcc9f4fcba13183c83eae7ec03e85ff308c28918
SHA512013049bdfa7aa378c1d6b5830d0a2ebdba988e474f233300139bd1dccef97d9db1d93636810189a76b90330dd16f4cc3a534c1ad17384a47487954ea573079ec