Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_4427fb3eabbc9d5606ab7e62ab004759_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-19_4427fb3eabbc9d5606ab7e62ab004759_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_4427fb3eabbc9d5606ab7e62ab004759_cryptolocker.exe
-
Size
35KB
-
MD5
4427fb3eabbc9d5606ab7e62ab004759
-
SHA1
01517b3e0be0a0875a3b1011dcb797f8fb4554cc
-
SHA256
f7e3142bef93c408e7a545631a091bbfdad4b2dff4f9a43d527e6721fe94be43
-
SHA512
fc60432663d9a9a4a258fad1e9e22b08fec90dd2ca68129771780b885b266dc4707cb7fd9952aca32f58cde946c29dae4ddf0ddc1b5528a3a2eccc9bd314c7b0
-
SSDEEP
384:bmM0V/YPvnr801TRoUGPh4TKt6ATt1DqgPa3s/zzoCt9/B1RU3qE4kb6oTy3:b7o/2n1TCraU6GD1a4Xt9bRU6zA6oTy3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2764 rewok.exe -
Loads dropped DLL 1 IoCs
pid Process 2320 2024-09-19_4427fb3eabbc9d5606ab7e62ab004759_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_4427fb3eabbc9d5606ab7e62ab004759_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rewok.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2320 2024-09-19_4427fb3eabbc9d5606ab7e62ab004759_cryptolocker.exe 2764 rewok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2764 2320 2024-09-19_4427fb3eabbc9d5606ab7e62ab004759_cryptolocker.exe 30 PID 2320 wrote to memory of 2764 2320 2024-09-19_4427fb3eabbc9d5606ab7e62ab004759_cryptolocker.exe 30 PID 2320 wrote to memory of 2764 2320 2024-09-19_4427fb3eabbc9d5606ab7e62ab004759_cryptolocker.exe 30 PID 2320 wrote to memory of 2764 2320 2024-09-19_4427fb3eabbc9d5606ab7e62ab004759_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_4427fb3eabbc9d5606ab7e62ab004759_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_4427fb3eabbc9d5606ab7e62ab004759_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD506b7969f884eef44e3f91a5317731c1b
SHA1e6d8255ced87ddcd3902832b4d25a58fd2f0d877
SHA2565b01c33a5fae031f96ec75184e2693bdb6aec6012d50077fa95d99982f50a1d6
SHA512d8b87fbb93100c71ce573cafd638e475d631e416bb25ce5dbe461c6084d056c65d023924d1fc53a81fc6aada6fa15db03b3eccb104bff9324b81c1c23e7406c2