Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 04:43
Behavioral task
behavioral1
Sample
2024-10-09_745172bbc0830a1d3f953827f2fd17d0_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-10-09_745172bbc0830a1d3f953827f2fd17d0_cryptolocker.exe
-
Size
63KB
-
MD5
745172bbc0830a1d3f953827f2fd17d0
-
SHA1
1cd59bdede2336fc8be042b68d4fdd880e7af98a
-
SHA256
7870efb7ea38dae0f90b3e52329d8db0dd3ac1106528f42f36bcc55dd09da5e1
-
SHA512
93cf7e52595013013938408da0eb4ba4bd5e0c91ab7525a9445ad3f108ea63fbef2565626707621a02904b1d90db431d17b2000f73e207d8cb59beb703a50ba7
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYjQcx:1nK6a+qdOOtEvwDpjk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2092 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 572 2024-10-09_745172bbc0830a1d3f953827f2fd17d0_cryptolocker.exe -
resource yara_rule behavioral1/memory/572-0-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x000e000000012262-11.dat upx behavioral1/memory/572-12-0x0000000001EF0000-0x0000000001F00000-memory.dmp upx behavioral1/memory/572-16-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/memory/2092-17-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/memory/2092-27-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-09_745172bbc0830a1d3f953827f2fd17d0_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 572 wrote to memory of 2092 572 2024-10-09_745172bbc0830a1d3f953827f2fd17d0_cryptolocker.exe 30 PID 572 wrote to memory of 2092 572 2024-10-09_745172bbc0830a1d3f953827f2fd17d0_cryptolocker.exe 30 PID 572 wrote to memory of 2092 572 2024-10-09_745172bbc0830a1d3f953827f2fd17d0_cryptolocker.exe 30 PID 572 wrote to memory of 2092 572 2024-10-09_745172bbc0830a1d3f953827f2fd17d0_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-09_745172bbc0830a1d3f953827f2fd17d0_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-09_745172bbc0830a1d3f953827f2fd17d0_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5920513c3ffe2978a73ef24acf9442122
SHA1b6b412c704c731ddfd80b1cf6d59266629f5c771
SHA256090d8c423987b3e0680726e256fa24493d305e33ad09ea7b8ee25fbc9c085e00
SHA5125906faf8873b55d062f24991e421fce50b320fb8292d9dbf6bba1279c20f31a04c847ab379d56ea8d741bda0cef78796e39220a1aa650f3ea7d7842b15498a70