Analysis
-
max time kernel
132s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 08:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-30_ed993f459705c27193b206ef54911854_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-30_ed993f459705c27193b206ef54911854_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-30_ed993f459705c27193b206ef54911854_cryptolocker.exe
-
Size
46KB
-
MD5
ed993f459705c27193b206ef54911854
-
SHA1
d4c69971aef6453cccf36b2dd5f00977c71f36ee
-
SHA256
d17a92c2fbb1a69231cf3d26590b81f4a0d0af846b27ea1e3fc4e70de0e5c33b
-
SHA512
501e3b3384183da5f31edb6021274202f25679823cf4b7207fb69ffe889c0a20025ae3d8e38df55136b1f7f9a6344465a8ea51b6a7ab8fec86956378fdd529c8
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFHuRcD9HyX:X6QFElP6n+gJQMOtEvwDpjBmzDkWDt4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1684 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2340 2024-09-30_ed993f459705c27193b206ef54911854_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-30_ed993f459705c27193b206ef54911854_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 1684 2340 2024-09-30_ed993f459705c27193b206ef54911854_cryptolocker.exe 30 PID 2340 wrote to memory of 1684 2340 2024-09-30_ed993f459705c27193b206ef54911854_cryptolocker.exe 30 PID 2340 wrote to memory of 1684 2340 2024-09-30_ed993f459705c27193b206ef54911854_cryptolocker.exe 30 PID 2340 wrote to memory of 1684 2340 2024-09-30_ed993f459705c27193b206ef54911854_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-30_ed993f459705c27193b206ef54911854_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-30_ed993f459705c27193b206ef54911854_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD55547a739f149dbd9ab897c08d497b1fc
SHA1766e6ee0731f1effa7d26a626f2d877bc109bc73
SHA256c89ac16824a638d506c9b87ac57354262ad004026cf8aca33e821cdc7ce4e5e6
SHA51211572b356125b2fa30cb436019d1d95c0f2eeb1088282e658c7bad884b2ec5aee865373fd64ce5ed0b228b4a9f4cc40217d35dd504b8797ba30ee7b424ac6d0c