Analysis
-
max time kernel
132s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 02:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-14_3a4a4b66d89920d9531318fc1660ad67_cryptolocker.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-09-14_3a4a4b66d89920d9531318fc1660ad67_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-14_3a4a4b66d89920d9531318fc1660ad67_cryptolocker.exe
-
Size
63KB
-
MD5
3a4a4b66d89920d9531318fc1660ad67
-
SHA1
22454375a00f7e6bd0195ead40ad58a1816868b0
-
SHA256
e23a1ae79d76a45939b6df47f085d2a107db6c5e85af0028611b6b1d1acf29f1
-
SHA512
1b9f71583454d9572d0fbc4a3e23d973132e6dead5d33800f159dcd421652342b12d72a01865a7c7af562c3e9d3d2acbe29513a08cd1e9174c31427d447a1726
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjyaLccVCbt5A/3g/6:V6a+pOtEvwDpjvh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2392 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1916 2024-09-14_3a4a4b66d89920d9531318fc1660ad67_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-14_3a4a4b66d89920d9531318fc1660ad67_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2392 1916 2024-09-14_3a4a4b66d89920d9531318fc1660ad67_cryptolocker.exe 30 PID 1916 wrote to memory of 2392 1916 2024-09-14_3a4a4b66d89920d9531318fc1660ad67_cryptolocker.exe 30 PID 1916 wrote to memory of 2392 1916 2024-09-14_3a4a4b66d89920d9531318fc1660ad67_cryptolocker.exe 30 PID 1916 wrote to memory of 2392 1916 2024-09-14_3a4a4b66d89920d9531318fc1660ad67_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-14_3a4a4b66d89920d9531318fc1660ad67_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-14_3a4a4b66d89920d9531318fc1660ad67_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD542c887450b7932a7eaf50dbe965bb923
SHA18b93db63a6208522a268c38457e2c0d518508c65
SHA256e7557d5b8bbd40c1ffbed5cf4951cf8bbc8277a8a610cee7b46f56905e0f6267
SHA512c9f0b104158ce0a8d2ac57fcf31bebb775ed4a8cd36f1604132f408b9a65ed99ad708d7166789604bd860d19f6582cef2a8a6ba3b7dae3699972815e3454567d