Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_43f03fa573e3f16bb5d5ea2ec1b05f5c_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-19_43f03fa573e3f16bb5d5ea2ec1b05f5c_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_43f03fa573e3f16bb5d5ea2ec1b05f5c_cryptolocker.exe
-
Size
68KB
-
MD5
43f03fa573e3f16bb5d5ea2ec1b05f5c
-
SHA1
f5fff4a1e49f19c8f6a2f4ebc33d49203d768aab
-
SHA256
7f89d1887e2270ae94c9b4aab95e16f3f73df74055f2e114bc7bcc42a0061492
-
SHA512
775346de3ed1fdf3a1f6b08e3fe69c8f1e6334829abad4fe9d205fa82c9cfce69efd135d278edacafc2fe4af4b89f4e7a7e749589959adafc4249040a6ea20cf
-
SSDEEP
1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2l9tMPvdfGy7l:TCjsIOtEvwDpj5HE/OUHnSMY2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2912 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2316 2024-09-19_43f03fa573e3f16bb5d5ea2ec1b05f5c_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_43f03fa573e3f16bb5d5ea2ec1b05f5c_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2912 2316 2024-09-19_43f03fa573e3f16bb5d5ea2ec1b05f5c_cryptolocker.exe 30 PID 2316 wrote to memory of 2912 2316 2024-09-19_43f03fa573e3f16bb5d5ea2ec1b05f5c_cryptolocker.exe 30 PID 2316 wrote to memory of 2912 2316 2024-09-19_43f03fa573e3f16bb5d5ea2ec1b05f5c_cryptolocker.exe 30 PID 2316 wrote to memory of 2912 2316 2024-09-19_43f03fa573e3f16bb5d5ea2ec1b05f5c_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_43f03fa573e3f16bb5d5ea2ec1b05f5c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_43f03fa573e3f16bb5d5ea2ec1b05f5c_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD5b9b7c58e2bb85f2eb4344a67ad538175
SHA139aa17dbaef77927c3edf788b7d19e0ba0a35e67
SHA25637746445db7e20377c4a95a2ea730a254d47c62a01703e391ff31de2d3c2aaf8
SHA512267ece30a142060818ed6bed82bb32acd6d30b8ef3a0bfcb8c6c12ed217a9a3d7d0d6c583e31a62abc8e6f224d99740de54942f5a8fb1ac9e8b263829f569796