Analysis
-
max time kernel
132s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-25_ef935cada454d115b76e12f0a5c74c0f_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-25_ef935cada454d115b76e12f0a5c74c0f_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-25_ef935cada454d115b76e12f0a5c74c0f_cryptolocker.exe
-
Size
42KB
-
MD5
ef935cada454d115b76e12f0a5c74c0f
-
SHA1
1d3ecee2df7748846f70a5e6983a6a2cc9f29ca0
-
SHA256
8a8e3c38132a97c5c5f012bce6aebd7c39b7b5382ef42630f267811188e4d76e
-
SHA512
8b9f96e99b5b71a922e9a9782d33fe7c7f5ed7a6c8126bf32e44e6e1f701f248e8447510e117dee961506a9e7021e30c97b4fecc45cc12d03a6df5c933acda57
-
SSDEEP
384:e/4wODQkzonAYsju5N/surDQtOOtEvwDpjqIGROqS/WccJVJwi2B5ci+Q:79inqyNR/QtOOtEvwDpjBKccJVODvce
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2316 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1880 2024-09-25_ef935cada454d115b76e12f0a5c74c0f_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-25_ef935cada454d115b76e12f0a5c74c0f_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1880 wrote to memory of 2316 1880 2024-09-25_ef935cada454d115b76e12f0a5c74c0f_cryptolocker.exe 30 PID 1880 wrote to memory of 2316 1880 2024-09-25_ef935cada454d115b76e12f0a5c74c0f_cryptolocker.exe 30 PID 1880 wrote to memory of 2316 1880 2024-09-25_ef935cada454d115b76e12f0a5c74c0f_cryptolocker.exe 30 PID 1880 wrote to memory of 2316 1880 2024-09-25_ef935cada454d115b76e12f0a5c74c0f_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-25_ef935cada454d115b76e12f0a5c74c0f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-25_ef935cada454d115b76e12f0a5c74c0f_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD547e5c5b0b30968694303a1332dc61dca
SHA1f52174094a3b676c4454faba158faa8c0c956286
SHA2565a29a3a4b0d9777f44f92e72e718db089955d8ad2334cdffa52c8cc67c0a7253
SHA5129d4be00b86b6c49bb0baa1557667c29deaf43f7bcb2b560274984f45008108e41eb5eb47688d33efa40531acc66c155649200927bf01baf76e49d60b52564f73