Analysis
-
max time kernel
132s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_abd9b8f2c0594b47c5262e400a4e0bed_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-19_abd9b8f2c0594b47c5262e400a4e0bed_cryptolocker.exe
Resource
win10v2004-20240910-en
General
-
Target
2024-09-19_abd9b8f2c0594b47c5262e400a4e0bed_cryptolocker.exe
-
Size
43KB
-
MD5
abd9b8f2c0594b47c5262e400a4e0bed
-
SHA1
82b7ff8b12a63efcac685d804c7d0219c731ac57
-
SHA256
98e22b91ae2f633a098efc6c419b638c917655d3c20013187ffd81b4ae2e7395
-
SHA512
49c7f9a9eab2c039966e4f5e63fe9a83d365d013dc9f05e18739afd97056d776ba6842c953af004990b3e7f1833839819a02f774e9f7813b72bbaa14355ed318
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaac4HK/wSvuQTCyD/95Ov:X6QFElP6n+gJQMOtEvwDpjBsYK/fbDFc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2520 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1712 2024-09-19_abd9b8f2c0594b47c5262e400a4e0bed_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_abd9b8f2c0594b47c5262e400a4e0bed_cryptolocker.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2520 1712 2024-09-19_abd9b8f2c0594b47c5262e400a4e0bed_cryptolocker.exe 30 PID 1712 wrote to memory of 2520 1712 2024-09-19_abd9b8f2c0594b47c5262e400a4e0bed_cryptolocker.exe 30 PID 1712 wrote to memory of 2520 1712 2024-09-19_abd9b8f2c0594b47c5262e400a4e0bed_cryptolocker.exe 30 PID 1712 wrote to memory of 2520 1712 2024-09-19_abd9b8f2c0594b47c5262e400a4e0bed_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_abd9b8f2c0594b47c5262e400a4e0bed_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_abd9b8f2c0594b47c5262e400a4e0bed_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD559f8f57b9eef12896befbdf50a839d73
SHA12253713e63cc4f420cc65bf200c658e72e915efd
SHA25606f16415d2d923983570f1298d9aecae0ce5c043df1cc5da0464744cb6aa4c19
SHA51223f652f58e763636bb39893b6e8425e443f2b8e3900b583f44a3ce36e026a68e9374ddd3e8835da1a3b9e74da033205e791ce7e94ecdf7ed229afaa09e0f1e8b