Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:42
Behavioral task
behavioral1
Sample
2024-09-19_d874b40e00650762b4712c872b8904cb_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-09-19_d874b40e00650762b4712c872b8904cb_cryptolocker.exe
-
Size
63KB
-
MD5
d874b40e00650762b4712c872b8904cb
-
SHA1
75a5e0a23c30334fe6d8d1ccf42811d9302bb523
-
SHA256
e5a94475aa8d9ab4aa9ed7aeaf7bdd9674f81adb50959cd3e4f47afc7f7f4fa0
-
SHA512
f9030394f0bb2a0fe6379efc7ed871813435b3ef219b4c30fb9a19ad1bce3bb6babd75799590a14d1b54a7ceaf1600b48b0c72dbaa2eff37d0769e345dc56895
-
SSDEEP
768:0Qz7yVEhs9+syJP6ntOOtEvwDpjFSXOQ69zbjlAAX5e9z/:0j+soPSMOtEvwDpjwizbR9Xwz/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2476 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2276 2024-09-19_d874b40e00650762b4712c872b8904cb_cryptolocker.exe -
resource yara_rule behavioral1/memory/2276-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000c0000000122e0-11.dat upx behavioral1/memory/2276-15-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2476-16-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2476-26-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_d874b40e00650762b4712c872b8904cb_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2476 2276 2024-09-19_d874b40e00650762b4712c872b8904cb_cryptolocker.exe 31 PID 2276 wrote to memory of 2476 2276 2024-09-19_d874b40e00650762b4712c872b8904cb_cryptolocker.exe 31 PID 2276 wrote to memory of 2476 2276 2024-09-19_d874b40e00650762b4712c872b8904cb_cryptolocker.exe 31 PID 2276 wrote to memory of 2476 2276 2024-09-19_d874b40e00650762b4712c872b8904cb_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_d874b40e00650762b4712c872b8904cb_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_d874b40e00650762b4712c872b8904cb_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5db04ee553475f72c2fda22a6de7eff67
SHA1674bf8bd5685c8b1a1efa9a4a77ec0f287d7104e
SHA25600cf97d02b5241bddde0a8dc5fb777fd59ae8f512f4e79e0d1c2ed74c47a13b8
SHA512771830d80f06f82163e7806125729577cd4d9f7f3e16739c3258eb952ab836f17e94eac436810c8b328fb1c23f91ee3831d5d83b741369d41d932220cd571ef7