Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-02_0aed4265eb64c6205258c4a625c61688_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-02_0aed4265eb64c6205258c4a625c61688_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-02_0aed4265eb64c6205258c4a625c61688_cryptolocker.exe
-
Size
45KB
-
MD5
0aed4265eb64c6205258c4a625c61688
-
SHA1
aaeaff94b29f5f59db1ffd3ec489757067c02d24
-
SHA256
62cfea77026c7f74eef64c4254e7bbfe0f43083f6b638cbb60f6e23cbd3fecb7
-
SHA512
12f718f2d6ac24169a526c9ba785f69dd7c6c6a54580ece6bc32d55b1159546e65d43899d5b4855210786783f10f9f6b0175c1988d0305c19e9bce7998f80f3f
-
SSDEEP
384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jb0nrlwfjDUk3b+NV:bm74zYcgT/EkM0ryfjd3WV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2444 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 1796 2024-10-02_0aed4265eb64c6205258c4a625c61688_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-02_0aed4265eb64c6205258c4a625c61688_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hasfj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1796 wrote to memory of 2444 1796 2024-10-02_0aed4265eb64c6205258c4a625c61688_cryptolocker.exe 31 PID 1796 wrote to memory of 2444 1796 2024-10-02_0aed4265eb64c6205258c4a625c61688_cryptolocker.exe 31 PID 1796 wrote to memory of 2444 1796 2024-10-02_0aed4265eb64c6205258c4a625c61688_cryptolocker.exe 31 PID 1796 wrote to memory of 2444 1796 2024-10-02_0aed4265eb64c6205258c4a625c61688_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-02_0aed4265eb64c6205258c4a625c61688_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-02_0aed4265eb64c6205258c4a625c61688_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5994c12136eb541acec9d46a57d6cad42
SHA1938d172d8c1d8481d05e8391b2eef1e4303e68d5
SHA256d8085e2280892ebedcd89d9e0f88dfcadd54514b555be5e1b8ffe50e2cd5042d
SHA512e3a80b42c2adce01585a36f6c51b29c9d65aacc379cb14251d73be50e07403774b700513c1a5a78fbad62c17c5e8fdc204017e842ff91ee830eb0fca3c1e9f3d