Analysis
-
max time kernel
132s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 08:40
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_44194339f532639cc3f2ae9e03e881ea_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-13_44194339f532639cc3f2ae9e03e881ea_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-13_44194339f532639cc3f2ae9e03e881ea_cryptolocker.exe
-
Size
44KB
-
MD5
44194339f532639cc3f2ae9e03e881ea
-
SHA1
ba2dca6d58660a01f5c956e39d31c7e645c3361c
-
SHA256
161391d492668507ce3aa92e75741c5fb6c6d92a2f875008a676067d4a61dcb0
-
SHA512
cc28c8852f7bad46c9ccb3bd8ffebd04f121c1425d6f5eae098147ea8526e391bd765b24de7f921413c9a5f92d3749bbfbe2963dff3617b604f2351e4705b461
-
SSDEEP
768:wHGGaSawqnwjRQ6ESlmFOsPoOdQtOOtEvwDpjm6WaJIOc+UPPEkL7vF1TE:YGzl5wjRQBBOsP1QMOtEvwDpjgarrkLE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2648 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2204 2024-09-13_44194339f532639cc3f2ae9e03e881ea_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-13_44194339f532639cc3f2ae9e03e881ea_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2648 2204 2024-09-13_44194339f532639cc3f2ae9e03e881ea_cryptolocker.exe 31 PID 2204 wrote to memory of 2648 2204 2024-09-13_44194339f532639cc3f2ae9e03e881ea_cryptolocker.exe 31 PID 2204 wrote to memory of 2648 2204 2024-09-13_44194339f532639cc3f2ae9e03e881ea_cryptolocker.exe 31 PID 2204 wrote to memory of 2648 2204 2024-09-13_44194339f532639cc3f2ae9e03e881ea_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_44194339f532639cc3f2ae9e03e881ea_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-13_44194339f532639cc3f2ae9e03e881ea_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5b9dcf07407c4ee016badc7f4eeca79b9
SHA1f4efb53300e857fc9db3862ebfcec28baf66cf5e
SHA25607133352398897356fab967debf34f95cffb340f636b8b4b04b48779eef38ed0
SHA512d16d778a7fde26aaff2f83d7f40427386820c66ff1b2f2da0e9f372669fbead31a4eef43f1784dc55324a52552fb0a5951f1624fb1920fe3abb90ff48ba7b1c6