Analysis
-
max time kernel
133s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 04:13
Behavioral task
behavioral1
Sample
2024-09-13_a4921ed78c35ad0164971a943ee771c1_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-09-13_a4921ed78c35ad0164971a943ee771c1_cryptolocker.exe
-
Size
59KB
-
MD5
a4921ed78c35ad0164971a943ee771c1
-
SHA1
12e3bc958983f3f0c1df0170948c20bf135401ba
-
SHA256
f00a374b44e6064bf08ee7ed8a77b3512f9dcb1233964a2706ac67ddcaa63b8f
-
SHA512
47fae6c6bc944c8cb48f057a67c2a300e45ca20c4f113b946342f21b299aa4a0f96d62cbbb58ed7865ac29258a98564e63b277a4c1c0f10010f84318884d7dc1
-
SSDEEP
768:f6LsoEEeegiZPvEhHSG+gz5NQXtckstOOtEvwDpj/WaD3TUogs/VXpAPWB:f6QFElP6n+g9u9cvMOtEvwDpjnpVXzB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2504 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2464 2024-09-13_a4921ed78c35ad0164971a943ee771c1_cryptolocker.exe -
resource yara_rule behavioral1/memory/2464-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000a000000012234-11.dat upx behavioral1/memory/2464-14-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2504-16-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2504-26-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-13_a4921ed78c35ad0164971a943ee771c1_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2504 2464 2024-09-13_a4921ed78c35ad0164971a943ee771c1_cryptolocker.exe 30 PID 2464 wrote to memory of 2504 2464 2024-09-13_a4921ed78c35ad0164971a943ee771c1_cryptolocker.exe 30 PID 2464 wrote to memory of 2504 2464 2024-09-13_a4921ed78c35ad0164971a943ee771c1_cryptolocker.exe 30 PID 2464 wrote to memory of 2504 2464 2024-09-13_a4921ed78c35ad0164971a943ee771c1_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_a4921ed78c35ad0164971a943ee771c1_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-13_a4921ed78c35ad0164971a943ee771c1_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5f26fa47519e7adc0f114a9a9530a012e
SHA13294e54d580029d9ad669dee3ba016353e77d631
SHA256b559e6d375f27d2d4fc67aba56409468296c50619218f9cf0718114da554fa36
SHA512c11c0d0975e7a94f870d1adf8007141fc42dd2defd35433af56bd6efefd1c628ed155704baa25db0ebab96753963ad724746c886b7069f1fc0d32231db79031d