Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-02_325a62baea5d14d36738fbba9fc16db4_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-02_325a62baea5d14d36738fbba9fc16db4_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-02_325a62baea5d14d36738fbba9fc16db4_cryptolocker.exe
-
Size
42KB
-
MD5
325a62baea5d14d36738fbba9fc16db4
-
SHA1
bb308ee4459324d5892ac6e849c3a76b0d4b1781
-
SHA256
8798c308be5591a8861b8eb151c7d9db0b274e06e5bbe6412f64e101251a18db
-
SHA512
caa2325b289bd775bc6d9da41bc4441fcb9e043edb179d4606047283be2deb5911779cca667681ec684ac966a7c3a000f1dc951f44a5c6b6d036fe2f4610cd98
-
SSDEEP
768:bA74zYcgT/Ekd0ryfjPIunqpeNswmT3HwnC/:bA6YcA/X6G0W143Q4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2776 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2652 2024-10-02_325a62baea5d14d36738fbba9fc16db4_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-02_325a62baea5d14d36738fbba9fc16db4_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hasfj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2776 2652 2024-10-02_325a62baea5d14d36738fbba9fc16db4_cryptolocker.exe 30 PID 2652 wrote to memory of 2776 2652 2024-10-02_325a62baea5d14d36738fbba9fc16db4_cryptolocker.exe 30 PID 2652 wrote to memory of 2776 2652 2024-10-02_325a62baea5d14d36738fbba9fc16db4_cryptolocker.exe 30 PID 2652 wrote to memory of 2776 2652 2024-10-02_325a62baea5d14d36738fbba9fc16db4_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-02_325a62baea5d14d36738fbba9fc16db4_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-02_325a62baea5d14d36738fbba9fc16db4_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD56c858b9549b2e71b1e500027511ae350
SHA1d9d10a70e08f6ec82edfe3bebefa9ac79673a0eb
SHA256536c3339b53fd2dc4d7678c13bd5c3b3ba0670854f7c233c309b431ab70e697c
SHA512114f34d4b68df851fbe0ceab47af032de406748c8f1c333844fdbd87829875a25dfbf193579d2cdf7da7e8ea8e6f97e00b5cd90540f0cad852de5b412d88a30c