Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:32
Behavioral task
behavioral1
Sample
2024-09-19_eb1bcd5e6869043f4685ae587f87a6a9_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-09-19_eb1bcd5e6869043f4685ae587f87a6a9_cryptolocker.exe
-
Size
96KB
-
MD5
eb1bcd5e6869043f4685ae587f87a6a9
-
SHA1
29f913ab7a94e2873c01dc73e97667ffc903b63e
-
SHA256
9a541d40a95502211d000ec10b6d75ef6aaf7e335e06c82fb2bb850e55f3f3fe
-
SHA512
e2d950a062fd7cdec40294eaa56833ca75b68ba3954008ec88e2459d26ecdd1c017778b7644fcf3eee99003611cdc30345e6e9d1fa544a1cda889e158c02e970
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp+ofI5MN:AnBdOOtEvwDpj6zG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1368 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2860 2024-09-19_eb1bcd5e6869043f4685ae587f87a6a9_cryptolocker.exe -
resource yara_rule behavioral1/memory/2860-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x0009000000012281-11.dat upx behavioral1/memory/2860-17-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/memory/1368-27-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_eb1bcd5e6869043f4685ae587f87a6a9_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 1368 2860 2024-09-19_eb1bcd5e6869043f4685ae587f87a6a9_cryptolocker.exe 30 PID 2860 wrote to memory of 1368 2860 2024-09-19_eb1bcd5e6869043f4685ae587f87a6a9_cryptolocker.exe 30 PID 2860 wrote to memory of 1368 2860 2024-09-19_eb1bcd5e6869043f4685ae587f87a6a9_cryptolocker.exe 30 PID 2860 wrote to memory of 1368 2860 2024-09-19_eb1bcd5e6869043f4685ae587f87a6a9_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_eb1bcd5e6869043f4685ae587f87a6a9_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_eb1bcd5e6869043f4685ae587f87a6a9_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5cca398fab7bc8d7745f2ec666aa3db65
SHA1ba0faf21dbaf0571de7a5cb8fae3d7bd50f3169f
SHA256a46198884489451dd4cb68f3f61c7ffb80f6da04572bd08dccbf9d50b09994b7
SHA512b4c54f6ed1cef39eab829d00ad1d594e47c9f8f7cda121de6c95ad80d7f8bbf4b3672706992e5bbb3e5b9c7facce0fdd1e5b5f3dca2fa853f79514ddcb66e6be