Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 11:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-11_93842c6285372e1689e230e91b1d01b0_cryptolocker.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-11_93842c6285372e1689e230e91b1d01b0_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-11_93842c6285372e1689e230e91b1d01b0_cryptolocker.exe
-
Size
51KB
-
MD5
93842c6285372e1689e230e91b1d01b0
-
SHA1
94671765b6869876b5f5a26571fc86cac559f457
-
SHA256
3379e53fb837753b65bbf9bdcb9b08fc4588499da3e96df8abaa4ba8039461b8
-
SHA512
3cbcaad5d475980812585b2359ca934d6caf09d5f1e8076f5f5905669c3642db8f30355568a3b2d8816ffd3a24352960f3688f9be14cff83502164f129ca163e
-
SSDEEP
768:lQz7yVEhs9+4uR1bytOOtEvwDpjWE6BLbjG9Rva/yYsZnTR:lj+VGMOtEvwDpjy+viHsT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2276 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2036 2024-09-11_93842c6285372e1689e230e91b1d01b0_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-11_93842c6285372e1689e230e91b1d01b0_cryptolocker.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2276 2036 2024-09-11_93842c6285372e1689e230e91b1d01b0_cryptolocker.exe 31 PID 2036 wrote to memory of 2276 2036 2024-09-11_93842c6285372e1689e230e91b1d01b0_cryptolocker.exe 31 PID 2036 wrote to memory of 2276 2036 2024-09-11_93842c6285372e1689e230e91b1d01b0_cryptolocker.exe 31 PID 2036 wrote to memory of 2276 2036 2024-09-11_93842c6285372e1689e230e91b1d01b0_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-11_93842c6285372e1689e230e91b1d01b0_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-11_93842c6285372e1689e230e91b1d01b0_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5e4455d7e9cdbc7ddcc5aff62637a3562
SHA1a674cb3f82e5dec59fe149ca9d51502dfeb15034
SHA2565d46fa22b52e463b8e39841f681fb681edfc1443d195911db6a9a7533e9c1314
SHA512a69d9326bf619c60b14778a80614ea09115ae47598d64641b564225b20b0b841b9c1a00cd0071de604eb018a8f245c142f44cfd8fd8a04b23e4caf3bb857d26a