Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-03_a6b10b9ec531383b05656261f134b680_cryptolocker.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-10-03_a6b10b9ec531383b05656261f134b680_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-03_a6b10b9ec531383b05656261f134b680_cryptolocker.exe
-
Size
39KB
-
MD5
a6b10b9ec531383b05656261f134b680
-
SHA1
2b6ab82eaa5e7f9688f06c3a348ed1fb4f6e1b9e
-
SHA256
01f0d42e6c196f89362755ae2b2299573a25c876818e27e046c497fccd3d8aba
-
SHA512
d34b903b0f78bf88a6d051e2f4e722ba23a0ab10cf1c150be989d024554ddd79405bf9426bdd60d28fad178f270a7b79fda6040c4880f1dc81c8eda864079d29
-
SSDEEP
768:fTz7y3lhsT+hs1SQtOOtEvwDpjfAu9+4qc:fT+hsMQMOtEvwDpjoIHb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2384 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2692 2024-10-03_a6b10b9ec531383b05656261f134b680_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-03_a6b10b9ec531383b05656261f134b680_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2384 2692 2024-10-03_a6b10b9ec531383b05656261f134b680_cryptolocker.exe 30 PID 2692 wrote to memory of 2384 2692 2024-10-03_a6b10b9ec531383b05656261f134b680_cryptolocker.exe 30 PID 2692 wrote to memory of 2384 2692 2024-10-03_a6b10b9ec531383b05656261f134b680_cryptolocker.exe 30 PID 2692 wrote to memory of 2384 2692 2024-10-03_a6b10b9ec531383b05656261f134b680_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-03_a6b10b9ec531383b05656261f134b680_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-03_a6b10b9ec531383b05656261f134b680_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD553af703c479ec9b2c73a8e8083fa2515
SHA1fbc28dab5920f33c811da34ef6c59751c14f5aa3
SHA256c4b06e598a925b0c3489d6d42a8af49afb052279f526453a181dfbd7aa5e4f10
SHA512322e1aba243000cc7292dec213dcefd83ce7a78af6375887791516ed3afde8111e27dd6089e5627b069aa03c74d779bef727dcfbf23e4ef15056ed3fbc994641