Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 03:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-03_4594f97f67244ecfcc5c894e23231ba1_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-03_4594f97f67244ecfcc5c894e23231ba1_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-03_4594f97f67244ecfcc5c894e23231ba1_cryptolocker.exe
-
Size
41KB
-
MD5
4594f97f67244ecfcc5c894e23231ba1
-
SHA1
2995b3403cd40b65035913b4366144d3deacfc58
-
SHA256
a5e066ef93f93b6637b98d8109fa63808ab408b36dfc1ea5746e1ddee8f28c25
-
SHA512
386b07400482eb2058ceef0266e9ac3a9f457be7fc29bf37390b09230e4e7d51574efa696b3c68c5de005e6c416f478808625e6c51af7a0680c2130161ecb1ed
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLeJAsKuD+h:ZzFbxmLPWQMOtEvwDpjLeJAsKcs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2828 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2736 2024-10-03_4594f97f67244ecfcc5c894e23231ba1_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-03_4594f97f67244ecfcc5c894e23231ba1_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2828 2736 2024-10-03_4594f97f67244ecfcc5c894e23231ba1_cryptolocker.exe 30 PID 2736 wrote to memory of 2828 2736 2024-10-03_4594f97f67244ecfcc5c894e23231ba1_cryptolocker.exe 30 PID 2736 wrote to memory of 2828 2736 2024-10-03_4594f97f67244ecfcc5c894e23231ba1_cryptolocker.exe 30 PID 2736 wrote to memory of 2828 2736 2024-10-03_4594f97f67244ecfcc5c894e23231ba1_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-03_4594f97f67244ecfcc5c894e23231ba1_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-03_4594f97f67244ecfcc5c894e23231ba1_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD55a171ed284a09a4781b3fbffae039559
SHA126f6e1dee705ef32e8237bf5c94dd57a155ad1fd
SHA256d1744f4fe4e2e1e7adc945ad4f1e0cc4cb0eb2cc13480978a56d526db628b32d
SHA5120fd110dde427479fdff0bedb3ce5a6f767c264e19a58e13715759302a7202dd96b217f132814bfeff5b2bfa82d6480d1c2c505b75954c27aa8ff251d815ddc04