Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 08:43
Behavioral task
behavioral1
Sample
2024-10-09_26854b78d871fe260957ec34ab28f35a_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-10-09_26854b78d871fe260957ec34ab28f35a_cryptolocker.exe
-
Size
71KB
-
MD5
26854b78d871fe260957ec34ab28f35a
-
SHA1
a630521be0d35961eddb45e6cb6ec5e9bf97a55e
-
SHA256
91991d09b5447cccc1253844d8d538a8d9f9ca11c96e8bcdf684966849b91f0a
-
SHA512
4b8282d9632007db6686d8a47a72d1045d794c4b24903e65972a2295d0060462132d7c92c95db98775ec9d205debf8c35eca506b54d9e0f4530e9b2d4d8af620
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9U:C4Q2c94OtEvwDpj4H8z9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2280 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 3028 2024-10-09_26854b78d871fe260957ec34ab28f35a_cryptolocker.exe -
resource yara_rule behavioral1/memory/3028-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000a00000001225d-11.dat upx behavioral1/memory/2280-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/3028-15-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2280-27-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-09_26854b78d871fe260957ec34ab28f35a_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2280 3028 2024-10-09_26854b78d871fe260957ec34ab28f35a_cryptolocker.exe 30 PID 3028 wrote to memory of 2280 3028 2024-10-09_26854b78d871fe260957ec34ab28f35a_cryptolocker.exe 30 PID 3028 wrote to memory of 2280 3028 2024-10-09_26854b78d871fe260957ec34ab28f35a_cryptolocker.exe 30 PID 3028 wrote to memory of 2280 3028 2024-10-09_26854b78d871fe260957ec34ab28f35a_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-09_26854b78d871fe260957ec34ab28f35a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-09_26854b78d871fe260957ec34ab28f35a_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD59774db80092872068e6e2d9e9c1528e3
SHA11f5538815242211f7b1f1a2b3c9029ebd711fba2
SHA256ed83660f80a5cfcef706c90c7cdc0a4db8c96a9ce3b9352c9128de412bbe1158
SHA51255a8cff916101ffc8d482aa4c986c38abc49d469142e4b3d8efdb4ae34daa28814c026da52d8eeadc40933b330451c593f049dafbe73460649c933fc5244a58b