Analysis
-
max time kernel
131s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 00:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-07_445e6f9862749bd4671b4d9ea6922009_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-07_445e6f9862749bd4671b4d9ea6922009_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-07_445e6f9862749bd4671b4d9ea6922009_cryptolocker.exe
-
Size
50KB
-
MD5
445e6f9862749bd4671b4d9ea6922009
-
SHA1
3665a86eb22528fec47af30d16a681eb51499d2f
-
SHA256
490038381393b43b9cbcce48136e2365e4ebc139e0e81a27d3c00750874c7a37
-
SHA512
1fea5f41130a06ef41feb836c269d0a1ba4e16073c781960cb71219d3852502cae43586328a88fe725984020ea3c06ca3b93ff7c8533a8aed32ef189f76c05ae
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLa5VccPtG9BF:V6QFElP6n+gMQMOtEvwDpjyaLccVGh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2280 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2516 2024-09-07_445e6f9862749bd4671b4d9ea6922009_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_445e6f9862749bd4671b4d9ea6922009_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2280 2516 2024-09-07_445e6f9862749bd4671b4d9ea6922009_cryptolocker.exe 30 PID 2516 wrote to memory of 2280 2516 2024-09-07_445e6f9862749bd4671b4d9ea6922009_cryptolocker.exe 30 PID 2516 wrote to memory of 2280 2516 2024-09-07_445e6f9862749bd4671b4d9ea6922009_cryptolocker.exe 30 PID 2516 wrote to memory of 2280 2516 2024-09-07_445e6f9862749bd4671b4d9ea6922009_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_445e6f9862749bd4671b4d9ea6922009_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-07_445e6f9862749bd4671b4d9ea6922009_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD59677178dbc2eab629c60114e77a1f71c
SHA1d6a3d32501b989a529b8652415ac74111c3589ca
SHA2565ff392084da48173d43f8714cfe3274ee52319e7b9295e9a41a552855efb9c33
SHA5122697a7946a05c247039e8a954a891afc567d30128f312196ad7e0e39a1d2568788981f69d3246cf26fe1113d19116f705aa912dc45070c3bc2f78913901ca8a1