Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 19:04
Behavioral task
behavioral1
Sample
2024-09-29_c21bedf813fe992bb7b2c7c0e9ec434b_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-09-29_c21bedf813fe992bb7b2c7c0e9ec434b_cryptolocker.exe
-
Size
36KB
-
MD5
c21bedf813fe992bb7b2c7c0e9ec434b
-
SHA1
52ba6c0b124a8b837d4ed5b7d9bf0096991e6e15
-
SHA256
b7c0e579335dc9c1babf08824cd2758a0fb059b7f5c815debdddd5d41217f4b9
-
SHA512
fbd39b5deebeeb49f1ba96bf1ea78d03fdd0fe817c2207f91e12f822f64293b2ba050309dfb218c9d7737f12456ee36dc31a7486122fcbe21a838c9bc6e21257
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkIT2:qDdFJy3QMOtEvwDpjjWMl7T2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2136 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1288 2024-09-29_c21bedf813fe992bb7b2c7c0e9ec434b_cryptolocker.exe -
resource yara_rule behavioral1/memory/1288-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000c00000001665b-11.dat upx behavioral1/memory/1288-16-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2136-18-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2136-28-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-29_c21bedf813fe992bb7b2c7c0e9ec434b_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2136 1288 2024-09-29_c21bedf813fe992bb7b2c7c0e9ec434b_cryptolocker.exe 29 PID 1288 wrote to memory of 2136 1288 2024-09-29_c21bedf813fe992bb7b2c7c0e9ec434b_cryptolocker.exe 29 PID 1288 wrote to memory of 2136 1288 2024-09-29_c21bedf813fe992bb7b2c7c0e9ec434b_cryptolocker.exe 29 PID 1288 wrote to memory of 2136 1288 2024-09-29_c21bedf813fe992bb7b2c7c0e9ec434b_cryptolocker.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-29_c21bedf813fe992bb7b2c7c0e9ec434b_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-29_c21bedf813fe992bb7b2c7c0e9ec434b_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD565ac5918ca01a4be779c5d11f31b215b
SHA135389299b078428525a6a56210fa6dc93568be64
SHA256ad7ff66ffacf3b8957c9d921e7a20425a10d3b6fc2a5673cd914e81c246e9f2f
SHA5125967d21e9bedefd7f92d677797611b40e6568e94fc4f79621ea6565cea4bb86ec3c496703eb056e9f99d40a520874f8ace2a1026ef12891634d47e2414dbd7c2