Analysis
-
max time kernel
133s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-04_ae8e1b06a9ab1690c0a51894224193ed_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-04_ae8e1b06a9ab1690c0a51894224193ed_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-04_ae8e1b06a9ab1690c0a51894224193ed_cryptolocker.exe
-
Size
47KB
-
MD5
ae8e1b06a9ab1690c0a51894224193ed
-
SHA1
7fafb9b70a528aa9234cb3f89f2b5dc213b9d836
-
SHA256
0bd71cb252b279e0d36a4a4ea86a2e8ca817df8024a4b2d908721a8d9ea2f093
-
SHA512
42bf6d075a0d27a8fe153926f42c0c19a4ed0c6b023a9b2e6e2f38b3e9c9a6de07ae479f37724eedc13324b832443b74f80881d57c2552411f1198523db1f369
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFHuRcD9Hkeda:X6QFElP6n+gJQMOtEvwDpjBmzDkWDt4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2544 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 264 2024-10-04_ae8e1b06a9ab1690c0a51894224193ed_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-04_ae8e1b06a9ab1690c0a51894224193ed_cryptolocker.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 264 wrote to memory of 2544 264 2024-10-04_ae8e1b06a9ab1690c0a51894224193ed_cryptolocker.exe 31 PID 264 wrote to memory of 2544 264 2024-10-04_ae8e1b06a9ab1690c0a51894224193ed_cryptolocker.exe 31 PID 264 wrote to memory of 2544 264 2024-10-04_ae8e1b06a9ab1690c0a51894224193ed_cryptolocker.exe 31 PID 264 wrote to memory of 2544 264 2024-10-04_ae8e1b06a9ab1690c0a51894224193ed_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-04_ae8e1b06a9ab1690c0a51894224193ed_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-04_ae8e1b06a9ab1690c0a51894224193ed_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5d2c1ed7f33f85df21ced692c19ce5bcd
SHA19a5eb47e56e2eb839315c6b1b28bcb44291e1374
SHA2564a80adafd0860f51b77e90d080ea023e01020ca3bd3cdb524db3c1ddb3488059
SHA512d376bae9dbb2338d6731743db308a9b488a4e149794d832a515cee05caa22512b715ff6a320673905bc859e0d615756517531b3617d14b251e3f48ee03f25ab3