Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 20:59
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-05_fa00ba56aebb0d9bcd3ad9ff8d7b8243_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-05_fa00ba56aebb0d9bcd3ad9ff8d7b8243_cryptolocker.exe
Resource
win10v2004-20240910-en
General
-
Target
2024-10-05_fa00ba56aebb0d9bcd3ad9ff8d7b8243_cryptolocker.exe
-
Size
45KB
-
MD5
fa00ba56aebb0d9bcd3ad9ff8d7b8243
-
SHA1
4f584bc602246f2ea0f0b01cc516fbf8ff516254
-
SHA256
96bb139c94acd4ad200b66c3f195fb5ebab98e0a58cd701b15ec17f0efa6db11
-
SHA512
3b3053a27919a530bbccff81fabc74b7006f007d32999eb1d3a32993f4b78454682e1add69338978a30f1531081f18d24e6e4e4e12e95a3808a766a480db158b
-
SSDEEP
768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvgpnY1n9w4:m5nkFNMOtEvwDpjG8hgpY19X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3068 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2168 2024-10-05_fa00ba56aebb0d9bcd3ad9ff8d7b8243_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-05_fa00ba56aebb0d9bcd3ad9ff8d7b8243_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 3068 2168 2024-10-05_fa00ba56aebb0d9bcd3ad9ff8d7b8243_cryptolocker.exe 30 PID 2168 wrote to memory of 3068 2168 2024-10-05_fa00ba56aebb0d9bcd3ad9ff8d7b8243_cryptolocker.exe 30 PID 2168 wrote to memory of 3068 2168 2024-10-05_fa00ba56aebb0d9bcd3ad9ff8d7b8243_cryptolocker.exe 30 PID 2168 wrote to memory of 3068 2168 2024-10-05_fa00ba56aebb0d9bcd3ad9ff8d7b8243_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-05_fa00ba56aebb0d9bcd3ad9ff8d7b8243_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-05_fa00ba56aebb0d9bcd3ad9ff8d7b8243_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD595164ff823a5290180f010dc0e8e5e0a
SHA1cd5a100efa1d6863dcf839e6bc4be241fc341181
SHA25636f6bbfd8c6083a5389fdf8693fc263efca06e1093efd66211159119e141a8b0
SHA51287cd2083a9a6102ce1b11b8565b65a49d5e8039e6d60ca1cade9a39262b3e51a67fed49937bca978c1f0860a16d4eb121350de7c0fef6414d744943d4c5a254a