Analysis
-
max time kernel
132s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_2ba1c5665e840aab023316cfb4a7efad_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-19_2ba1c5665e840aab023316cfb4a7efad_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_2ba1c5665e840aab023316cfb4a7efad_cryptolocker.exe
-
Size
47KB
-
MD5
2ba1c5665e840aab023316cfb4a7efad
-
SHA1
78d0481c82df8c7c1c1e8e363c76484f29fd9ef4
-
SHA256
03714991c24d52c138ab24d6ca81aca344752d681063d9672ebd6624ca836c96
-
SHA512
7ecb94dd8f3b1ac9fddf5362c4fb3b13daf7e86854f83c6e481ba50d18e89de6578d960cfe639ef87f5dd5286a273985878eb31dacd36f1f32e75124158118c2
-
SSDEEP
768:y6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpjbXOQ69zbjlAAX5e9zr+:y6QFElP6n+gMQMOtEvwDpjbizbR9Xwza
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2224 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2024 2024-09-19_2ba1c5665e840aab023316cfb4a7efad_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_2ba1c5665e840aab023316cfb4a7efad_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2224 2024 2024-09-19_2ba1c5665e840aab023316cfb4a7efad_cryptolocker.exe 31 PID 2024 wrote to memory of 2224 2024 2024-09-19_2ba1c5665e840aab023316cfb4a7efad_cryptolocker.exe 31 PID 2024 wrote to memory of 2224 2024 2024-09-19_2ba1c5665e840aab023316cfb4a7efad_cryptolocker.exe 31 PID 2024 wrote to memory of 2224 2024 2024-09-19_2ba1c5665e840aab023316cfb4a7efad_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_2ba1c5665e840aab023316cfb4a7efad_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_2ba1c5665e840aab023316cfb4a7efad_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD52f17540becc65e3c98a88559f0813577
SHA1cfa9dda54ae4ff93ed821713747e7a8e691b4df9
SHA25669da81e7ac9173f134e3c38937936d78091ebdce4ca6d45bbbd751355ed505f9
SHA512d772fbd77b04d8c70b63329e3a785c984ed422042f5fdcf23738442e43f700977947f9754681cfe18b3f3a61e152e67fce7c61848dc6313daf304b52fec03b46