Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 04:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-27_09376107a1a71680f041894890efc20a_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-27_09376107a1a71680f041894890efc20a_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-27_09376107a1a71680f041894890efc20a_cryptolocker.exe
-
Size
87KB
-
MD5
09376107a1a71680f041894890efc20a
-
SHA1
ffa6258f918c14cec41f7c990b22296b4a99530a
-
SHA256
e42796ca810f5150d01dd317f383d35e37e6c2424acf75fa5e13212d7ba52e62
-
SHA512
05244781f7bb2157663b61d871646b5816322ff647ab0129fd81bc75c1fc120e4dd8c883c8c36d034955afc384c59198d87ccccfa711c7e8995ca63491acb433
-
SSDEEP
1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMMrCs3:TCjsIOtEvwDpj5HE/OUHnSM7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 576 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1172 2024-09-27_09376107a1a71680f041894890efc20a_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-27_09376107a1a71680f041894890efc20a_cryptolocker.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1172 wrote to memory of 576 1172 2024-09-27_09376107a1a71680f041894890efc20a_cryptolocker.exe 31 PID 1172 wrote to memory of 576 1172 2024-09-27_09376107a1a71680f041894890efc20a_cryptolocker.exe 31 PID 1172 wrote to memory of 576 1172 2024-09-27_09376107a1a71680f041894890efc20a_cryptolocker.exe 31 PID 1172 wrote to memory of 576 1172 2024-09-27_09376107a1a71680f041894890efc20a_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_09376107a1a71680f041894890efc20a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-27_09376107a1a71680f041894890efc20a_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5e454cfe97add7609d2bc512b8a1a12b4
SHA1f44dfe1c72ed130be1a467c1350cc54975abb481
SHA256d8bf00a364693d01e67dc49ce3e3ab4753b7808809ff26f82e990d041bc9c3d4
SHA512804b70550fd799dfdafe8c15d8c7f386d095008f2051a399c9ee45d85de607aa1c99ae956ea7293bdcedea0760399703c9cd9f780f15c33cd37dcc2e322b3305