Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-06_40a2c93b7f1ce7362b6bfd63e77e34b4_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-06_40a2c93b7f1ce7362b6bfd63e77e34b4_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-06_40a2c93b7f1ce7362b6bfd63e77e34b4_cryptolocker.exe
-
Size
37KB
-
MD5
40a2c93b7f1ce7362b6bfd63e77e34b4
-
SHA1
8e03d365342d62c01c2634a115aae175e749c4d0
-
SHA256
0c39b66c97c8881db9e84d751696069945964dd736779e8831d9b6f3a156c737
-
SHA512
740f6ba2156e265a95dd8456bbf0f5c09f38805beecabcf725bab135dcc4fa27b357cb95d50667692833bf2eb2c6fb3ea11606266876c892df12ec09b32797dd
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqE4:qmbhXDmjr5MOtEvwDpj5cDtKkQZ4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2844 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2764 2024-10-06_40a2c93b7f1ce7362b6bfd63e77e34b4_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-06_40a2c93b7f1ce7362b6bfd63e77e34b4_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2844 2764 2024-10-06_40a2c93b7f1ce7362b6bfd63e77e34b4_cryptolocker.exe 31 PID 2764 wrote to memory of 2844 2764 2024-10-06_40a2c93b7f1ce7362b6bfd63e77e34b4_cryptolocker.exe 31 PID 2764 wrote to memory of 2844 2764 2024-10-06_40a2c93b7f1ce7362b6bfd63e77e34b4_cryptolocker.exe 31 PID 2764 wrote to memory of 2844 2764 2024-10-06_40a2c93b7f1ce7362b6bfd63e77e34b4_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-06_40a2c93b7f1ce7362b6bfd63e77e34b4_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-06_40a2c93b7f1ce7362b6bfd63e77e34b4_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD580547c31b29196105ab5d143674506b8
SHA1f3a37eb0c9a7837002f589572f9347edbb342116
SHA2562cf20b1dfa234f3951a208b5ee3588351de71c8f3e5c5eca5bc927a615ff2d6f
SHA512a8d98d025a89c292196c4beee3ca8d8c9661ce18bd999b778e65a58afefaa5cd54f5015eae13b7542373b9198dc5fd93910d08dfca72cc7cd9284131536f09bd