Analysis
-
max time kernel
137s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 18:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-06_26b12d3f59e55324b6a63c520db609ef_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-06_26b12d3f59e55324b6a63c520db609ef_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-06_26b12d3f59e55324b6a63c520db609ef_cryptolocker.exe
-
Size
47KB
-
MD5
26b12d3f59e55324b6a63c520db609ef
-
SHA1
25de39398038aec094b704fff4ee0d6992100591
-
SHA256
1575ee0a75f9be643bca717854b346608f50e1bc202fcb81dcabae22554c95fe
-
SHA512
6b6c24774b527608b726ae268d8e07903d3f357af8e8b786c4557cc0d4bc2ad1db962b129bc0f6705c9e60b3c2a66c55bcc2665abe3a87101b4712b13997b36f
-
SSDEEP
768:26LsoVEeegiZPvEhHSP+gDdQtOOtEvwDpjtMLZdzuqpXsiE8Wq/DpkITYaq:26Q0ElP6G+gBQMOtEvwDpjgWMl7TYaq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 588 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1328 2024-09-06_26b12d3f59e55324b6a63c520db609ef_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-06_26b12d3f59e55324b6a63c520db609ef_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1328 wrote to memory of 588 1328 2024-09-06_26b12d3f59e55324b6a63c520db609ef_cryptolocker.exe 30 PID 1328 wrote to memory of 588 1328 2024-09-06_26b12d3f59e55324b6a63c520db609ef_cryptolocker.exe 30 PID 1328 wrote to memory of 588 1328 2024-09-06_26b12d3f59e55324b6a63c520db609ef_cryptolocker.exe 30 PID 1328 wrote to memory of 588 1328 2024-09-06_26b12d3f59e55324b6a63c520db609ef_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-06_26b12d3f59e55324b6a63c520db609ef_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-06_26b12d3f59e55324b6a63c520db609ef_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5dfe1bc815d34a789e1c2fd60d00a4aea
SHA1299a9bad512692a3329d51e98d1df97668990979
SHA256dfb29395dd8f67ff6c1d6e342264ed8ea005d0602176180399da3ec8b0b29e51
SHA5121899411347574a25cb694a2af2c7d2ce34c8ecadc0262c68f97fa3292449dcff8a0e47033d8ae8e9f642265b69c4977e44bbf482d985ff2d916bb429931f4fdf