Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 04:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-25_ab0f9dd42c1043d8637fce86fecdc7fd_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-25_ab0f9dd42c1043d8637fce86fecdc7fd_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-25_ab0f9dd42c1043d8637fce86fecdc7fd_cryptolocker.exe
-
Size
119KB
-
MD5
ab0f9dd42c1043d8637fce86fecdc7fd
-
SHA1
3dafb7dc22ccad584f6860fc448a275c3bc94a9c
-
SHA256
8755b364d286235cac7b49096fbacd6337c817e66fff86ae3842f3d939131d7c
-
SHA512
2657ad247ee4548ba740bc2251f8c9eb1eeb3eaf606d5b75bbf1bd0866d8b057a4bac6e9857e28aad5afb4496912af0cdc13b0ba98d5b3fb8cf03d91c8f750e3
-
SSDEEP
768:gUQz7yVEhs9+4T/1bytOOtEvwDpjNbZ7uyA36S7MpxRIIXVe3mU9TYwlOBTT:gUj+AIMOtEvwDpjNbwQEIPlemUhYj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3000 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2948 2024-09-25_ab0f9dd42c1043d8637fce86fecdc7fd_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-25_ab0f9dd42c1043d8637fce86fecdc7fd_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2948 wrote to memory of 3000 2948 2024-09-25_ab0f9dd42c1043d8637fce86fecdc7fd_cryptolocker.exe 31 PID 2948 wrote to memory of 3000 2948 2024-09-25_ab0f9dd42c1043d8637fce86fecdc7fd_cryptolocker.exe 31 PID 2948 wrote to memory of 3000 2948 2024-09-25_ab0f9dd42c1043d8637fce86fecdc7fd_cryptolocker.exe 31 PID 2948 wrote to memory of 3000 2948 2024-09-25_ab0f9dd42c1043d8637fce86fecdc7fd_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-25_ab0f9dd42c1043d8637fce86fecdc7fd_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-25_ab0f9dd42c1043d8637fce86fecdc7fd_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5d2a3abdb2fbe5238f84b167809f8f434
SHA196527ef8ff0f054dbc98e23639d3f90ee3090f8a
SHA2562b85086dd8939d86785e5ea63bfc981affddd448a2da4e3c498984da4f202da1
SHA5123ca32f5bc3a4744adda467a489a4e9c73ada6dbd91b9e30db84ba59ef098ea4b67707a04dc6df0d4b7831ead46c0790acfb9fbacdd4032a9faa10dce423732a1