Analysis
-
max time kernel
14s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 11:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-21_937477211075a3fa37aa939ab92a580d_cryptolocker.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-21_937477211075a3fa37aa939ab92a580d_cryptolocker.exe
Resource
win10v2004-20240910-en
General
-
Target
2024-09-21_937477211075a3fa37aa939ab92a580d_cryptolocker.exe
-
Size
30KB
-
MD5
937477211075a3fa37aa939ab92a580d
-
SHA1
04de7df28bef1a6f970cce09d685fecefd7b1582
-
SHA256
760829c1d83e673dd2f25c359634645b3a83b6105d05aee05a3b02152861f552
-
SHA512
8953f8c14ec10dd53f96ab1ab6f6c4f79c47d4906ce95f257ccf514f05c29a1fad507c598729e383f0f017b05362b2b3a4272862f1865ee4e45cce0ade3d1579
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznBEo:b/yC4GyNM01GuQMNXw2PSjP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2072 retln.exe -
Loads dropped DLL 1 IoCs
pid Process 1692 2024-09-21_937477211075a3fa37aa939ab92a580d_cryptolocker.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-21_937477211075a3fa37aa939ab92a580d_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language retln.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1692 2024-09-21_937477211075a3fa37aa939ab92a580d_cryptolocker.exe 2072 retln.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2072 1692 2024-09-21_937477211075a3fa37aa939ab92a580d_cryptolocker.exe 30 PID 1692 wrote to memory of 2072 1692 2024-09-21_937477211075a3fa37aa939ab92a580d_cryptolocker.exe 30 PID 1692 wrote to memory of 2072 1692 2024-09-21_937477211075a3fa37aa939ab92a580d_cryptolocker.exe 30 PID 1692 wrote to memory of 2072 1692 2024-09-21_937477211075a3fa37aa939ab92a580d_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-21_937477211075a3fa37aa939ab92a580d_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-21_937477211075a3fa37aa939ab92a580d_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5bb3f7e33be31a84d348e19d0967c8a25
SHA1e7ddf20523d161ef19ad463804a86721cd7b9a7b
SHA2561dd530b504c2e854b9e959d26236d97ea6f8ba925b48cd6739fb18a35ff22de2
SHA512687202e4bb6b846bcfea034e31c545297cb9047e1139622bec26a763783d9dc9f1e977cb4fa7616d9614d414afd492e50b6459c5aa7537616657a339cc064ab7