Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 04:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-09_a85d27d795a4c6186c86a69a4beb0643_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-09_a85d27d795a4c6186c86a69a4beb0643_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-09_a85d27d795a4c6186c86a69a4beb0643_cryptolocker.exe
-
Size
47KB
-
MD5
a85d27d795a4c6186c86a69a4beb0643
-
SHA1
8bd97773e3f6acf148f210173a4fb8c684ee3e24
-
SHA256
935c981948fe5f17f6c7fa57e9b9ac888d14a9e649448317b552d12b78e450b1
-
SHA512
86de5de9c99cd039022ddc33bb9c6f323131a7ef60e2b9e6ca918bf2aa4d59bb8832d42c74db9922f802ac3b91bf47cc31a39fac69a213da36590bdf7bb1c69c
-
SSDEEP
768:xQz7yVEhs9+4uR1bytOOtEvwDpjWE6BLtldLA/M:xj+VGMOtEvwDpjk/LJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2692 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2392 2024-10-09_a85d27d795a4c6186c86a69a4beb0643_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-09_a85d27d795a4c6186c86a69a4beb0643_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2692 2392 2024-10-09_a85d27d795a4c6186c86a69a4beb0643_cryptolocker.exe 31 PID 2392 wrote to memory of 2692 2392 2024-10-09_a85d27d795a4c6186c86a69a4beb0643_cryptolocker.exe 31 PID 2392 wrote to memory of 2692 2392 2024-10-09_a85d27d795a4c6186c86a69a4beb0643_cryptolocker.exe 31 PID 2392 wrote to memory of 2692 2392 2024-10-09_a85d27d795a4c6186c86a69a4beb0643_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-09_a85d27d795a4c6186c86a69a4beb0643_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-09_a85d27d795a4c6186c86a69a4beb0643_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5ee4d8071c5a2a60c357f5a66a370ab99
SHA1c2ecd9b028765c24208e157b1c08be2d0c959155
SHA256b0e39f585642c45f7da1ba361a2cc56006a0b1c1ca37df444fc58a84b9c80a7b
SHA512e4cdbc3db2e2443cee44650eab8000ffe2359752b62f4d14d82c652879b2bfb8028e83de9be55b8632f2b1cfe4e27bf7ce8940f99fc77d5b0bf8aff7917fff56