Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 08:21
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-25_268f0f20ff79ee60aba088d47583acb9_cryptolocker.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-09-25_268f0f20ff79ee60aba088d47583acb9_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-25_268f0f20ff79ee60aba088d47583acb9_cryptolocker.exe
-
Size
52KB
-
MD5
268f0f20ff79ee60aba088d47583acb9
-
SHA1
ffb48a51c9fafd3c401d584b782d49f542abbf68
-
SHA256
fad63a3a41f97b41ac903d6de1a908e432d765bb226a35125ddfbb9c369103d5
-
SHA512
8edbe60b9e33456107356be46209cb232a3cb5d2ce73300a318b8e5784d25e599e1d8cdb222493cfb3f9ee5bdc5937a92f34b43f7cdcb7ceabd41222fef26a0e
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLa5VccP6aDXlmfwV:V6QFElP6n+gMQMOtEvwDpjyaLccCGXlX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2212 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2320 2024-09-25_268f0f20ff79ee60aba088d47583acb9_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-25_268f0f20ff79ee60aba088d47583acb9_cryptolocker.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2212 2320 2024-09-25_268f0f20ff79ee60aba088d47583acb9_cryptolocker.exe 29 PID 2320 wrote to memory of 2212 2320 2024-09-25_268f0f20ff79ee60aba088d47583acb9_cryptolocker.exe 29 PID 2320 wrote to memory of 2212 2320 2024-09-25_268f0f20ff79ee60aba088d47583acb9_cryptolocker.exe 29 PID 2320 wrote to memory of 2212 2320 2024-09-25_268f0f20ff79ee60aba088d47583acb9_cryptolocker.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-25_268f0f20ff79ee60aba088d47583acb9_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-25_268f0f20ff79ee60aba088d47583acb9_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD55482482ce27416c2ae19f566bc44587a
SHA12837a2ec20be0d4bf16432ac76decb6fdac6a095
SHA256b420f771f6d691225c092d78045f5961470c6455c52adf1874044246b858e03a
SHA512bccf14072c6f1205d22bbebfdeb84c1254a12ca51b6c5421194b6e00ef010327b96afc7a474c9b77e33ca3e2e2d5d84e8d5dcfb8a84398d1bfbae35bb42a6a04