Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 03:00
Behavioral task
behavioral1
Sample
2024-10-10_821a59a61b8b98ad67c360b25d55cc1f_cryptolocker.exe
Resource
win7-20240708-en
General
-
Target
2024-10-10_821a59a61b8b98ad67c360b25d55cc1f_cryptolocker.exe
-
Size
90KB
-
MD5
821a59a61b8b98ad67c360b25d55cc1f
-
SHA1
2a0e69767e182dbc10190820092cb083c9a1b673
-
SHA256
b6a8b2657d706d2267891dc4daac9eb9873753fdad13c4a48e506cd6dd0167e8
-
SHA512
c6a433d615bf726dc5ca91290c1845d920cc81dd6a53a5b7c3d151af8bbeff74a3e94c139126442dc4c8d3f5779699e649401774349c7a0df4ae1299e2c9ad05
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjQ9T:zCsanOtEvwDpjz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2520 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2032 2024-10-10_821a59a61b8b98ad67c360b25d55cc1f_cryptolocker.exe -
resource yara_rule behavioral1/memory/2032-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000d000000014348-11.dat upx behavioral1/memory/2032-14-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2520-16-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2520-26-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-10_821a59a61b8b98ad67c360b25d55cc1f_cryptolocker.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2520 2032 2024-10-10_821a59a61b8b98ad67c360b25d55cc1f_cryptolocker.exe 30 PID 2032 wrote to memory of 2520 2032 2024-10-10_821a59a61b8b98ad67c360b25d55cc1f_cryptolocker.exe 30 PID 2032 wrote to memory of 2520 2032 2024-10-10_821a59a61b8b98ad67c360b25d55cc1f_cryptolocker.exe 30 PID 2032 wrote to memory of 2520 2032 2024-10-10_821a59a61b8b98ad67c360b25d55cc1f_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-10_821a59a61b8b98ad67c360b25d55cc1f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-10_821a59a61b8b98ad67c360b25d55cc1f_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5c53285691a1c43448c85008522f6eec7
SHA115884b9d7ae05bba5ddad6b1f241bbdd07afa0ab
SHA25689307a4bad3fa72852049e0c3bf8f8ffec40ed183d55ae6ad884b14d46088e34
SHA512e6a090f3325c2ab9740a9ad211ba44b99412e5c6f4089e88b1b1d09f0dbfdad25a9b62963cd0946d60ce22a611132dd716ce2fbf0c451d933cb8e4a442409463