Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 20:11
Behavioral task
behavioral1
Sample
2024-10-01_c4043dba0f86c1398b9db1757fdbdddb_cryptolocker.exe
Resource
win7-20240708-en
General
-
Target
2024-10-01_c4043dba0f86c1398b9db1757fdbdddb_cryptolocker.exe
-
Size
38KB
-
MD5
c4043dba0f86c1398b9db1757fdbdddb
-
SHA1
5c42a2f2cb2ca17ad05bf2904dd80c09db31013b
-
SHA256
16636dadc62cdb86898f8d6d86108cdcce893d1a25333e35fae6b92cff8483f7
-
SHA512
282fa0d5daa0502975a80fb381756176e309badcf3d045eb4bde61f262f1f4ce16480250d069191b2d9dd4d6a5907979eeeee6eb93e8f04ce775cfe175d19a5d
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITs:qDdFJy3QMOtEvwDpjjWMl7Ts
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2944 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2668 2024-10-01_c4043dba0f86c1398b9db1757fdbdddb_cryptolocker.exe -
resource yara_rule behavioral1/memory/2668-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x00080000000120fb-11.dat upx behavioral1/memory/2944-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2668-16-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2944-27-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-01_c4043dba0f86c1398b9db1757fdbdddb_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2944 2668 2024-10-01_c4043dba0f86c1398b9db1757fdbdddb_cryptolocker.exe 30 PID 2668 wrote to memory of 2944 2668 2024-10-01_c4043dba0f86c1398b9db1757fdbdddb_cryptolocker.exe 30 PID 2668 wrote to memory of 2944 2668 2024-10-01_c4043dba0f86c1398b9db1757fdbdddb_cryptolocker.exe 30 PID 2668 wrote to memory of 2944 2668 2024-10-01_c4043dba0f86c1398b9db1757fdbdddb_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-01_c4043dba0f86c1398b9db1757fdbdddb_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-01_c4043dba0f86c1398b9db1757fdbdddb_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5359cd7ef6c0e8be5dbe4323748332399
SHA1b1be4dc5728da3691c844518d427858c4a09de1b
SHA25682fa7e076738f7ec890cf261af0c81bbb646832165308960e867915d12039d24
SHA5124a909733693569093cc345c7d83a558207d47974145d96e3a6c80569b58884819249a7ac7abf7d16d55fb45280f194d4c620bd11c04486e6525abd903ffe1336