Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_f1b7c22da3201d46579527ecbd42a41e_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-19_f1b7c22da3201d46579527ecbd42a41e_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_f1b7c22da3201d46579527ecbd42a41e_cryptolocker.exe
-
Size
42KB
-
MD5
f1b7c22da3201d46579527ecbd42a41e
-
SHA1
a497239abc0e710633985a137cdcd95d83b451db
-
SHA256
6884e7c7923b6705cbd85ac9b7d90310b8103d29610f8dccf3a889b179812132
-
SHA512
7af78161978993f94dae5b66f22416d32e4367dcb15074ee1cc772cbefc4fbb80387d7fe9ff7ab4e18edb59da1619e53f0109b257584aff354042242eef9ba12
-
SSDEEP
768:bA74zYcgT/Ekd0ryfjPIunqpeNswmT3HwnCi:bA6YcA/X6G0W143QZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2960 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2748 2024-09-19_f1b7c22da3201d46579527ecbd42a41e_cryptolocker.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_f1b7c22da3201d46579527ecbd42a41e_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hasfj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2960 2748 2024-09-19_f1b7c22da3201d46579527ecbd42a41e_cryptolocker.exe 30 PID 2748 wrote to memory of 2960 2748 2024-09-19_f1b7c22da3201d46579527ecbd42a41e_cryptolocker.exe 30 PID 2748 wrote to memory of 2960 2748 2024-09-19_f1b7c22da3201d46579527ecbd42a41e_cryptolocker.exe 30 PID 2748 wrote to memory of 2960 2748 2024-09-19_f1b7c22da3201d46579527ecbd42a41e_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_f1b7c22da3201d46579527ecbd42a41e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_f1b7c22da3201d46579527ecbd42a41e_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5516b75d37e7488df128326d18a930cbf
SHA16749143aa14dec791be3f22c780f8035b27a9d16
SHA2563fce949adaac4900d67ad053c040b43e286e6df9067e1c83d240e7d961047fc5
SHA512c4d577a150393039a42318b4eb6c0a42127281bc4da790f2d8c7005a318366440a972b1400145a402a78ff877d186689410ed78f763b3469774f5e6dd30d7962