Analysis
-
max time kernel
132s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 07:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-05_982be96edfc8fb874e88d5d43cf26caa_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-05_982be96edfc8fb874e88d5d43cf26caa_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-05_982be96edfc8fb874e88d5d43cf26caa_cryptolocker.exe
-
Size
43KB
-
MD5
982be96edfc8fb874e88d5d43cf26caa
-
SHA1
12f3e262e1bbf265c564bae83a8c7890157031b9
-
SHA256
def89fca09acd991badc7a1aa2496d207dad7ac86ed56ee73ff3ade241e550c8
-
SHA512
9f86d129b409d6933d7652985117d9ac5dfe2ab8fabba238a77f633a06d294bd46fa840355cfcf38d44877605dbca4bb8cd313fb936fca75e02bd8e52a1b38d9
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaac4HK/wSvuQTCyD/95R:X6QFElP6n+gJQMOtEvwDpjBsYK/fbDF/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3024 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1900 2024-10-05_982be96edfc8fb874e88d5d43cf26caa_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-05_982be96edfc8fb874e88d5d43cf26caa_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 3024 1900 2024-10-05_982be96edfc8fb874e88d5d43cf26caa_cryptolocker.exe 30 PID 1900 wrote to memory of 3024 1900 2024-10-05_982be96edfc8fb874e88d5d43cf26caa_cryptolocker.exe 30 PID 1900 wrote to memory of 3024 1900 2024-10-05_982be96edfc8fb874e88d5d43cf26caa_cryptolocker.exe 30 PID 1900 wrote to memory of 3024 1900 2024-10-05_982be96edfc8fb874e88d5d43cf26caa_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-05_982be96edfc8fb874e88d5d43cf26caa_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-05_982be96edfc8fb874e88d5d43cf26caa_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5ed189b1c1232916bcd0fd34b63ee9e1f
SHA11789395b1baab57afc243faf42d5b18ec4ccf8ba
SHA2563578ca004c0c453b0c675b917d63de557efad35bee86f078f76131b62957ecb1
SHA512775b35ccf45081f16229ff41e6b57140f005c0bf57420eebf316ffe0f5efcecefae8222785e8f9d744f6d21b922811144dd8cf0dfc5f2fa9e76c736b713a94e2