Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_1e8eeda09aa668cc1bfc39e18776cedb_cryptolocker.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-09-19_1e8eeda09aa668cc1bfc39e18776cedb_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_1e8eeda09aa668cc1bfc39e18776cedb_cryptolocker.exe
-
Size
23KB
-
MD5
1e8eeda09aa668cc1bfc39e18776cedb
-
SHA1
1d0d57f0abb8ad0ba3aac701b2a570c39b5a9b35
-
SHA256
5a687afeb7ed7e98e058bc515874b8f2ccd65da0b67b177d5b2e8750cf436623
-
SHA512
cfe79bbe1c1bc277240c45ff6e06ffa19cfe078f6a33959ab855afe89eb35b6a5b4609923472cfbb32862c2f9d44974bc820c9e5ca0d9e895aac3a5dfd8b6652
-
SSDEEP
384:QBOkkLPcM4JIM39ZR8Z87XHjeKtFDcRYpTtOOtEvwDpjqIGRc:QB19M4JIhZMHSKtBcROtOOtEvwDpjf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2448 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2488 2024-09-19_1e8eeda09aa668cc1bfc39e18776cedb_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_1e8eeda09aa668cc1bfc39e18776cedb_cryptolocker.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2448 2488 2024-09-19_1e8eeda09aa668cc1bfc39e18776cedb_cryptolocker.exe 31 PID 2488 wrote to memory of 2448 2488 2024-09-19_1e8eeda09aa668cc1bfc39e18776cedb_cryptolocker.exe 31 PID 2488 wrote to memory of 2448 2488 2024-09-19_1e8eeda09aa668cc1bfc39e18776cedb_cryptolocker.exe 31 PID 2488 wrote to memory of 2448 2488 2024-09-19_1e8eeda09aa668cc1bfc39e18776cedb_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_1e8eeda09aa668cc1bfc39e18776cedb_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_1e8eeda09aa668cc1bfc39e18776cedb_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD56994fc65ba5853f9e2ecf439d2b6835d
SHA1b8afd0320d26db2e91ba2235ed6dcf34abf14dba
SHA256fe63a3f054afe622ed40dcd79bf8075b718cdf382a48aa735ed55b8de67b8700
SHA512d9ab52c41694dbb6d551f3bc4113d80319d30ba41ce081b8cb40f3e269d1828455a53e712a7328ffa10de5de031ea1b80014d6a926e2e3504825c42a5a4fbb76