Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 10:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_2fcf3ad67ccb9368e2914aab3b5d001a_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-19_2fcf3ad67ccb9368e2914aab3b5d001a_cryptolocker.exe
Resource
win10v2004-20240910-en
General
-
Target
2024-09-19_2fcf3ad67ccb9368e2914aab3b5d001a_cryptolocker.exe
-
Size
44KB
-
MD5
2fcf3ad67ccb9368e2914aab3b5d001a
-
SHA1
5c06852e50f2e72d2805b160d15a89d8af8125b5
-
SHA256
3c1ca1530e66c7e6b576e937c29fdf392977ac9ff3624d7834d6df413491dd49
-
SHA512
04e2753053d2c5ad376eba00c18b25aaef7946cc8ba3bf3ef933b31e4a4f35442c165d06dd2cd8bc490ec628273cc5e1f344b8cc144d6863db26cbb6a23db468
-
SSDEEP
384:icX+ni9VCr5nQI021q4VQBqURYp055TOtOOtEvwDpjqIGR/hHi7/OlI0b/:XS5nQJ24LR1bytOOtEvwDpjNbK/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2684 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 3020 2024-09-19_2fcf3ad67ccb9368e2914aab3b5d001a_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_2fcf3ad67ccb9368e2914aab3b5d001a_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2684 3020 2024-09-19_2fcf3ad67ccb9368e2914aab3b5d001a_cryptolocker.exe 30 PID 3020 wrote to memory of 2684 3020 2024-09-19_2fcf3ad67ccb9368e2914aab3b5d001a_cryptolocker.exe 30 PID 3020 wrote to memory of 2684 3020 2024-09-19_2fcf3ad67ccb9368e2914aab3b5d001a_cryptolocker.exe 30 PID 3020 wrote to memory of 2684 3020 2024-09-19_2fcf3ad67ccb9368e2914aab3b5d001a_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_2fcf3ad67ccb9368e2914aab3b5d001a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_2fcf3ad67ccb9368e2914aab3b5d001a_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5423a2f441c5a0fb799276c129173493d
SHA1a17f8cfa3f6bf35eba644b19f40b1058d5943e90
SHA256c1e5c4bebe381b6ce62a46d4b12f51632445982411087ac42bd5b8acf20fca5b
SHA512370a89ede4772b27ed7f360777d933d4c78a8166ea1da714a8766786f0597db6a56b23baeed5e055ec7d025c161b35c025b50578892a57a06aa4c5133dff17ef