Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:30
Behavioral task
behavioral1
Sample
2024-09-19_6792f5012c298ae10ab810c3402728fa_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-09-19_6792f5012c298ae10ab810c3402728fa_cryptolocker.exe
-
Size
39KB
-
MD5
6792f5012c298ae10ab810c3402728fa
-
SHA1
952e1822c3a4eaa598d547ad6729546c0bd8a29d
-
SHA256
915e5de7d37767af31c33713345c76a33849160e47ab4739246c4d6637bc3ff9
-
SHA512
ec10c53174e5d2921f429e304b60e17f9e2145a11efeed8a67c5a885e704bc545c2ccef27a5619d0cd5d3a39bbb78f8711ec8c7b953870f3200778eaefc02eb1
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYan/M7:qDdFJy3QMOtEvwDpjjWMl7Tdn/W
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1036 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2380 2024-09-19_6792f5012c298ae10ab810c3402728fa_cryptolocker.exe -
resource yara_rule behavioral1/memory/2380-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x0033000000011c23-11.dat upx behavioral1/memory/2380-16-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1036-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1036-26-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_6792f5012c298ae10ab810c3402728fa_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1036 2380 2024-09-19_6792f5012c298ae10ab810c3402728fa_cryptolocker.exe 30 PID 2380 wrote to memory of 1036 2380 2024-09-19_6792f5012c298ae10ab810c3402728fa_cryptolocker.exe 30 PID 2380 wrote to memory of 1036 2380 2024-09-19_6792f5012c298ae10ab810c3402728fa_cryptolocker.exe 30 PID 2380 wrote to memory of 1036 2380 2024-09-19_6792f5012c298ae10ab810c3402728fa_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_6792f5012c298ae10ab810c3402728fa_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_6792f5012c298ae10ab810c3402728fa_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD52e69741b55f6cf1a93a66ba4d9e9d84a
SHA1c7e7bf26d751130222e94633a2c0e25c211f0afc
SHA256bdd4f179e449f5eb9bc9c441357366405157e7c396516641748379fc82cfd25c
SHA512be5fcdf95aa833b865a8799ced1eea0f62c52c97b0800138e210dc5c84cea1f8ace64374ba41f5e5b590cb250314f51a9809984d7c8f1f941a7f1fe25c88f7c6