Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_e8621ae53ee3a62a45222bb28eeb1db8_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-19_e8621ae53ee3a62a45222bb28eeb1db8_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_e8621ae53ee3a62a45222bb28eeb1db8_cryptolocker.exe
-
Size
49KB
-
MD5
e8621ae53ee3a62a45222bb28eeb1db8
-
SHA1
e5c4d78343d1cdeaf954d33b6c152a0f7b25dad0
-
SHA256
c2100573bcedd2cc3c95c5ed30d926f3159f042bc1e8a04bf7340cf8bce02cb1
-
SHA512
fc29dcc285f7d7fac690726e8b26dd0b861cdadfbf6c526cd1f0c4c2dbb65ccd2490cc7c55cb7bde31baf4834c377ff29a31dad728fbaf519953269b5779ba4a
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu556BlvsTj:X6QFElP6n+gJQMOtEvwDpjB0GIWSlvIj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2708 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2136 2024-09-19_e8621ae53ee3a62a45222bb28eeb1db8_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_e8621ae53ee3a62a45222bb28eeb1db8_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2708 2136 2024-09-19_e8621ae53ee3a62a45222bb28eeb1db8_cryptolocker.exe 30 PID 2136 wrote to memory of 2708 2136 2024-09-19_e8621ae53ee3a62a45222bb28eeb1db8_cryptolocker.exe 30 PID 2136 wrote to memory of 2708 2136 2024-09-19_e8621ae53ee3a62a45222bb28eeb1db8_cryptolocker.exe 30 PID 2136 wrote to memory of 2708 2136 2024-09-19_e8621ae53ee3a62a45222bb28eeb1db8_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_e8621ae53ee3a62a45222bb28eeb1db8_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_e8621ae53ee3a62a45222bb28eeb1db8_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5b8e7ce8826e8d37dc71eb2fac5aa0625
SHA1f75dcf5b17f7dd44500293a69169d2d2f7be408a
SHA2564915ce431f49235f932c9847119932783542d23423a4f6be0309cea90bab4759
SHA512ff1378276d5f97e496931fffec07e416172d4b81c7ed3190e611267487fabbcdc1a8239aac071a24a8b08524295f87cebb5c40c4cb4c1381c084fb5e3d8272c6