Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 11:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-11_e3c3ee4743ed7be4ade8a170d4e14cb3_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-11_e3c3ee4743ed7be4ade8a170d4e14cb3_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-11_e3c3ee4743ed7be4ade8a170d4e14cb3_cryptolocker.exe
-
Size
73KB
-
MD5
e3c3ee4743ed7be4ade8a170d4e14cb3
-
SHA1
9c849dd1dd5c1eed3a981d084ce19c8b1f35dcea
-
SHA256
03a8a4335d1cae2d87a1a52a9853d134cf8fff312bd3388edf92c6fe12631332
-
SHA512
5a5dfae9607e4d51a8bec3acff76d894a2d4e0feee02e9fb53249c62ccd43def9b2d8af4949ddcb0628d0a5ad69d6827d8e361ead757e4397dfcc1bf060b32f3
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4ZPsED3VK2+ZtyOjgO4r9vFAg2rq2g1B/RG:vj+jsMQMOtEvwDpj5HZYTjipvF24pM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1280 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1600 2024-09-11_e3c3ee4743ed7be4ade8a170d4e14cb3_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-11_e3c3ee4743ed7be4ade8a170d4e14cb3_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1280 1600 2024-09-11_e3c3ee4743ed7be4ade8a170d4e14cb3_cryptolocker.exe 30 PID 1600 wrote to memory of 1280 1600 2024-09-11_e3c3ee4743ed7be4ade8a170d4e14cb3_cryptolocker.exe 30 PID 1600 wrote to memory of 1280 1600 2024-09-11_e3c3ee4743ed7be4ade8a170d4e14cb3_cryptolocker.exe 30 PID 1600 wrote to memory of 1280 1600 2024-09-11_e3c3ee4743ed7be4ade8a170d4e14cb3_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-11_e3c3ee4743ed7be4ade8a170d4e14cb3_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-11_e3c3ee4743ed7be4ade8a170d4e14cb3_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD507e6ee21d0b5b7b65d0ab4b9f1f003ea
SHA14c88daa50cc3ffb18cf235cdb37e3568a29852fa
SHA2564efe91ed2cd406bed84df836c7dab684df4c75fe38c9f799b9ff9ee83b6e682a
SHA51261d0e0a4b598cb5408e19734aced0cf70ade894fbba886bdcb5dc997e1646a7e5a30890c746bf9d8b17773f81fc490533d7f841004b1dff38ded1c15d3083cf8