Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_359ec95cc0a442868301c207799d8597_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-19_359ec95cc0a442868301c207799d8597_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_359ec95cc0a442868301c207799d8597_cryptolocker.exe
-
Size
60KB
-
MD5
359ec95cc0a442868301c207799d8597
-
SHA1
8fb02f7a72c517d26c36bb5c10ea75d895a8e6a2
-
SHA256
0f68a613d7c6cd1ad59a69e6d47398116fa629b8b4592890355d3cf935e8de96
-
SHA512
f437d86a161d3cd66ec4a9f7fa4dbc11dce2d84217c9cbb75a06c5353344ab6696a20555e913ef55265955035d10780c80425b0421b137f99c856638858ac93f
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjIm8z2iaSIO/RvDQeduJHqqnY:ZzFbxmLPWQMOtEvwDpj386Sj/RsY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2500 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2272 2024-09-19_359ec95cc0a442868301c207799d8597_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_359ec95cc0a442868301c207799d8597_cryptolocker.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2500 2272 2024-09-19_359ec95cc0a442868301c207799d8597_cryptolocker.exe 30 PID 2272 wrote to memory of 2500 2272 2024-09-19_359ec95cc0a442868301c207799d8597_cryptolocker.exe 30 PID 2272 wrote to memory of 2500 2272 2024-09-19_359ec95cc0a442868301c207799d8597_cryptolocker.exe 30 PID 2272 wrote to memory of 2500 2272 2024-09-19_359ec95cc0a442868301c207799d8597_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_359ec95cc0a442868301c207799d8597_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_359ec95cc0a442868301c207799d8597_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD52ce3024ec277787f4e0827b36c077f95
SHA1207eb1519de24c1abed5654a7370a90b68bd453c
SHA256a735a06bf6f349d45a488c3a42efaacbd73ded3aef142675b13b617e7a30f5e1
SHA5125470c2502ddee866191c4ae0ac116e0dcdf32a3f2fb24e2106694e72e5335894716090a25de09f849990be51faf634bdc3ad218fea250013fecc5b548efc7eba