Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 04:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-09_b07b3631d82edd604a4fa324291a7d6d_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-09_b07b3631d82edd604a4fa324291a7d6d_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-09_b07b3631d82edd604a4fa324291a7d6d_cryptolocker.exe
-
Size
28KB
-
MD5
b07b3631d82edd604a4fa324291a7d6d
-
SHA1
c6317495a88b23584649d08dd402f3fe42649c74
-
SHA256
10d7d015e9324505d8a91509d360a7c68934daa3487252481db19e02c0106880
-
SHA512
50f1b4995a4f050627bb5a36515d629c78c8459d8ac285ab2f9f68878279acf44bdb4b69ac16b0d578c6bf86c8e5a6c00e4921cc8087633b318e6eb0dc79bb67
-
SSDEEP
768:IRFBgME4kmW6FtnKn7DI6tOOtEvwDpjVAW:SgME4kJ6D0MOtEvwDpjeW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2656 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1508 2024-10-09_b07b3631d82edd604a4fa324291a7d6d_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-09_b07b3631d82edd604a4fa324291a7d6d_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2656 1508 2024-10-09_b07b3631d82edd604a4fa324291a7d6d_cryptolocker.exe 31 PID 1508 wrote to memory of 2656 1508 2024-10-09_b07b3631d82edd604a4fa324291a7d6d_cryptolocker.exe 31 PID 1508 wrote to memory of 2656 1508 2024-10-09_b07b3631d82edd604a4fa324291a7d6d_cryptolocker.exe 31 PID 1508 wrote to memory of 2656 1508 2024-10-09_b07b3631d82edd604a4fa324291a7d6d_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-09_b07b3631d82edd604a4fa324291a7d6d_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-09_b07b3631d82edd604a4fa324291a7d6d_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD55146745dd9b1cbb5c633690aa6846060
SHA169c5c883c8beeb7690492a496ff3be10d489b5f9
SHA256958da60360038bda6b42ff83089e3c9abcb935c9e826488c590879767501fde1
SHA5125013d7e53402992fa0cab61d539e4dc50094cf1dab1dbd5dcde4b7b43c972a5a634eb64989b56b8da45d9f3a67f43ba23ceed940cd1a0d2173b2751336b45660