Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 06:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-05_0f09b68446c43607fe27967c3cd46d83_cryptolocker.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-10-05_0f09b68446c43607fe27967c3cd46d83_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-05_0f09b68446c43607fe27967c3cd46d83_cryptolocker.exe
-
Size
72KB
-
MD5
0f09b68446c43607fe27967c3cd46d83
-
SHA1
0b0107f88acbf4e10fc579239b91ce7c571e86be
-
SHA256
b48506da8eb4232b22774c098c5659d889764c21d5dd283dd84befdf57e0b6d6
-
SHA512
abeb5ee764c69e7207d00e5ec6c7c1d36b41485a14ea8f094a22369e954d67bde2b093ca626c642753e72121e11eaeae969b01b8073c2136aa8b2dfeef8999a2
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4ZPsED3VK2+ZtyOjgO4r9vFAg2rq2g1B/RI:vj+jsMQMOtEvwDpj5HZYTjipvF24g
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2712 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2716 2024-10-05_0f09b68446c43607fe27967c3cd46d83_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-05_0f09b68446c43607fe27967c3cd46d83_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2712 2716 2024-10-05_0f09b68446c43607fe27967c3cd46d83_cryptolocker.exe 30 PID 2716 wrote to memory of 2712 2716 2024-10-05_0f09b68446c43607fe27967c3cd46d83_cryptolocker.exe 30 PID 2716 wrote to memory of 2712 2716 2024-10-05_0f09b68446c43607fe27967c3cd46d83_cryptolocker.exe 30 PID 2716 wrote to memory of 2712 2716 2024-10-05_0f09b68446c43607fe27967c3cd46d83_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-05_0f09b68446c43607fe27967c3cd46d83_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-05_0f09b68446c43607fe27967c3cd46d83_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5941ae4c1f29458243545b0399fd2b314
SHA1f71c9f3363e0c5062bc0f6eb4a93c783adf9c757
SHA25678e3b51aa8126d46773e22b9eb8191366610415e802e96b7993d8ebc74050dd9
SHA512720c1f5ea0f88fd6b56bf7044e2455e830d2e330303b960664e7039bdda5a8f93b46755a3ec6186cb7de480d7a7fe16bfcf1c767501f35623d01fd4e15e9c1c4