Analysis
-
max time kernel
132s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-09_cec60b991df3d25cfcff90e63a581bb5_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-09_cec60b991df3d25cfcff90e63a581bb5_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-09_cec60b991df3d25cfcff90e63a581bb5_cryptolocker.exe
-
Size
47KB
-
MD5
cec60b991df3d25cfcff90e63a581bb5
-
SHA1
3265e09e90154efddf673dfd399a39a827fb170d
-
SHA256
10cff8a9397aa118e5884636833a1d8299772254cf590bc69cf9bc23260a1275
-
SHA512
19677eb2f80a309470e3c391ff6a296308e9e8175ef6420c6d2a141cce5f84ccd97cd18d835462439d20d7b2e7e66385e7921090d0030ad424fe6c118561e2d3
-
SSDEEP
768:y6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpjbXOQ69zbjlAAX5e9zrE:y6QFElP6n+gMQMOtEvwDpjbizbR9Xwzo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2516 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1488 2024-09-09_cec60b991df3d25cfcff90e63a581bb5_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-09_cec60b991df3d25cfcff90e63a581bb5_cryptolocker.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2516 1488 2024-09-09_cec60b991df3d25cfcff90e63a581bb5_cryptolocker.exe 31 PID 1488 wrote to memory of 2516 1488 2024-09-09_cec60b991df3d25cfcff90e63a581bb5_cryptolocker.exe 31 PID 1488 wrote to memory of 2516 1488 2024-09-09_cec60b991df3d25cfcff90e63a581bb5_cryptolocker.exe 31 PID 1488 wrote to memory of 2516 1488 2024-09-09_cec60b991df3d25cfcff90e63a581bb5_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-09_cec60b991df3d25cfcff90e63a581bb5_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-09_cec60b991df3d25cfcff90e63a581bb5_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5dcc266d12e74b847d042e8a3fd74faa2
SHA1753a8a3b7c936739eb2cafaa17779e4ff3c66e2b
SHA256d8e62c44d358413f9f8c2d89852910fb14eb9344f3db9a1420d46c61d480859e
SHA5125e62fac5b532874a88f721698fff97506dc9f4b03cb6ef4a3ac4af403cf46f7d826c006b75f93c04573acad332885fd710ffd53af7163d2b3c292fb36948fe32