Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 02:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_a39dd0e02b65c916387f6b127436ccf6_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-19_a39dd0e02b65c916387f6b127436ccf6_cryptolocker.exe
Resource
win10v2004-20240910-en
General
-
Target
2024-09-19_a39dd0e02b65c916387f6b127436ccf6_cryptolocker.exe
-
Size
46KB
-
MD5
a39dd0e02b65c916387f6b127436ccf6
-
SHA1
b44a6e98f86a315ea0ea9668b985e8bf81901059
-
SHA256
8808b5b3f0f7a38e9c54376cd8bcc9eb58fa1ac5795c24306698ee90d127adf7
-
SHA512
c5de609d5cc235ea1aad0a6f1194873b10f8eb8c25c9d2a6a93feceafafff5b9759fa5464047668e8bc80eb42b98c7367f1cc36ca6b967ca3923076a60e967c3
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5aFr7YOzzfm0EXsJ6:V6QFElP6n+gMQMOtEvwDpjyaYaFAh37
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2132 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1748 2024-09-19_a39dd0e02b65c916387f6b127436ccf6_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_a39dd0e02b65c916387f6b127436ccf6_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2132 1748 2024-09-19_a39dd0e02b65c916387f6b127436ccf6_cryptolocker.exe 30 PID 1748 wrote to memory of 2132 1748 2024-09-19_a39dd0e02b65c916387f6b127436ccf6_cryptolocker.exe 30 PID 1748 wrote to memory of 2132 1748 2024-09-19_a39dd0e02b65c916387f6b127436ccf6_cryptolocker.exe 30 PID 1748 wrote to memory of 2132 1748 2024-09-19_a39dd0e02b65c916387f6b127436ccf6_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_a39dd0e02b65c916387f6b127436ccf6_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_a39dd0e02b65c916387f6b127436ccf6_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD56b3f896eb1774fc30ab52acd13dd0c48
SHA11130c0e8effbdecc4d1912d3f8c85ecfb8234494
SHA256500171eb8ad08e75f1dfb8d4dc997bcbb1f7c41cdc399ae703f66eda48e54b4d
SHA512c6cca294ca0e7b6999c11ec6979b90c5d20b656685baa722948c0f7971f99681e32b2d258b4b798075fd42e9653bc81c301b5bd58f4b66e6a6384c12c2778ce2