Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 07:21
Behavioral task
behavioral1
Sample
2024-09-28_707433aa2c1c63232f2b2e6b888b975b_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-09-28_707433aa2c1c63232f2b2e6b888b975b_cryptolocker.exe
-
Size
85KB
-
MD5
707433aa2c1c63232f2b2e6b888b975b
-
SHA1
89f13e5a54f9dc5d35e44bff42fbb9398c8ec918
-
SHA256
d615de693613dfd7e565cd8182d47e19f6fc6c7744fdfb02e4a25e4d4ae5ca1a
-
SHA512
900a03240184a724140bbfe4f377227a553a8cd51868b9f0cfc022d9ed86f1201fd035ffa4e5ca4c3299bb7fc646682eb00795790aad8aae5215e651529066bd
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtI8:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2820 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 3056 2024-09-28_707433aa2c1c63232f2b2e6b888b975b_cryptolocker.exe -
resource yara_rule behavioral1/memory/3056-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x000b000000012259-11.dat upx behavioral1/memory/3056-15-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/memory/2820-26-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-28_707433aa2c1c63232f2b2e6b888b975b_cryptolocker.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2820 3056 2024-09-28_707433aa2c1c63232f2b2e6b888b975b_cryptolocker.exe 31 PID 3056 wrote to memory of 2820 3056 2024-09-28_707433aa2c1c63232f2b2e6b888b975b_cryptolocker.exe 31 PID 3056 wrote to memory of 2820 3056 2024-09-28_707433aa2c1c63232f2b2e6b888b975b_cryptolocker.exe 31 PID 3056 wrote to memory of 2820 3056 2024-09-28_707433aa2c1c63232f2b2e6b888b975b_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-28_707433aa2c1c63232f2b2e6b888b975b_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-28_707433aa2c1c63232f2b2e6b888b975b_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD5028b204236e471bcb1c1694ae144be0a
SHA153a844f27db17d010498a256a48395aad28d476d
SHA25659b4a750e97317fc330a1484443c14893e756f2a10a1e4ac2e2d216a4b052471
SHA512d6fe79a6a0fcf06c04211ef346886203b47625eebd90be9935a663a9bcd7c33828b98445c295f1cd5526cd02356f62197da39874e168e4a3220db6ccfb8f4735