Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 03:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_1f1e2faa2490898392c784551471d46a_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-19_1f1e2faa2490898392c784551471d46a_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_1f1e2faa2490898392c784551471d46a_cryptolocker.exe
-
Size
92KB
-
MD5
1f1e2faa2490898392c784551471d46a
-
SHA1
3e2ea1f184eaae9b235a2fdca3e062327106131e
-
SHA256
9512245a18c3211a981ad62cca149401df4495ed93cfa238b865f9e92d194843
-
SHA512
60eb14849997f97fccd8d8196edeaac51abccfc673befc2641307c456dc9c6d79e4d0d2ea237c844b038db63f8eb229e0bf289d46a3f4d5386eb0a38329ce651
-
SSDEEP
1536:26QFElP6n+gBQMOtEvwDpjQGYQbN/PKwNC+:26a+2OtEvwDpjtzh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2700 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 3052 2024-09-19_1f1e2faa2490898392c784551471d46a_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_1f1e2faa2490898392c784551471d46a_cryptolocker.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2700 3052 2024-09-19_1f1e2faa2490898392c784551471d46a_cryptolocker.exe 31 PID 3052 wrote to memory of 2700 3052 2024-09-19_1f1e2faa2490898392c784551471d46a_cryptolocker.exe 31 PID 3052 wrote to memory of 2700 3052 2024-09-19_1f1e2faa2490898392c784551471d46a_cryptolocker.exe 31 PID 3052 wrote to memory of 2700 3052 2024-09-19_1f1e2faa2490898392c784551471d46a_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_1f1e2faa2490898392c784551471d46a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_1f1e2faa2490898392c784551471d46a_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD56c939119ee1069221ee96665fae11eed
SHA14ce6f73dd6a5af93db0ce1f2066f3edc8c801f29
SHA25606a2adfa9d3644fd9e36da656c04e598c4343f3467ba4eafae1a57b76e456347
SHA512c824257d66a3f2911d1981fe0daddb6737c7466d4901891230d17efeb7c4bc7d599f7c1127a71f5dd02bbccd73d3dfc8bb6adbc1109eecb738d052c7ad00acbf