Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-02_63bc51983036e3c7c93a7f96fc909e31_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-02_63bc51983036e3c7c93a7f96fc909e31_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-02_63bc51983036e3c7c93a7f96fc909e31_cryptolocker.exe
-
Size
79KB
-
MD5
63bc51983036e3c7c93a7f96fc909e31
-
SHA1
2554ec9ffff4ce599d483f207d515ca84b675153
-
SHA256
48ebfb9e7a3d50b3e1fa7c3b69826d46932e859903c1230e162b50782a4994ac
-
SHA512
b12180553e63cd0c9841a1b581a0596d5cfd33051c3c4ad529646d709d1124fadcdd80d41f15846e8dd598f3b6067feff313a807639bfc3886c1e3d76f725bd7
-
SSDEEP
1536:ZzFbxmLPWQMOtEvwDpj386Sj/WprgJN6tZdOyJ3KUJ/:ZVxkGOtEvwDpjca1/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2220 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2700 2024-10-02_63bc51983036e3c7c93a7f96fc909e31_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-02_63bc51983036e3c7c93a7f96fc909e31_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2220 2700 2024-10-02_63bc51983036e3c7c93a7f96fc909e31_cryptolocker.exe 30 PID 2700 wrote to memory of 2220 2700 2024-10-02_63bc51983036e3c7c93a7f96fc909e31_cryptolocker.exe 30 PID 2700 wrote to memory of 2220 2700 2024-10-02_63bc51983036e3c7c93a7f96fc909e31_cryptolocker.exe 30 PID 2700 wrote to memory of 2220 2700 2024-10-02_63bc51983036e3c7c93a7f96fc909e31_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-02_63bc51983036e3c7c93a7f96fc909e31_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-02_63bc51983036e3c7c93a7f96fc909e31_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5e79aad2093c41715875d99d3d70acab4
SHA1770c8f8d428ce3fa23ec2cea020e9a725b47f29e
SHA256237db47bbeaefdfc6f7ddb7be1e24473faa3e92b3a131febad09c1352c892f69
SHA512a3e3382f034370aeb17d0d49cd2cb72ecab955ea41ca9f02740e8146aa5a9fb2c72f5625b938f284f1c18ac2fc64db595462ac8194b02e419edbb6f3cf466812