Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_d5e0f7c8090351abd709154d0b9166e5_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-12_d5e0f7c8090351abd709154d0b9166e5_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_d5e0f7c8090351abd709154d0b9166e5_cryptolocker.exe
-
Size
56KB
-
MD5
d5e0f7c8090351abd709154d0b9166e5
-
SHA1
6abfe9bee5a5c2bf26afe6d156782079bf195db7
-
SHA256
8504c25227a37dc969a1b18883e943099b9db08f266f38ce1bc0131fe4484548
-
SHA512
0188bd7ecfd8e52dbfdf8f912833af23202ab92d9fe7243e3f46cb355ba90418732d78fa6e993064fe2feefd0afb04136f221493cddca935c19352dc5566e27f
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb614M:BbdDmjr+OtEvwDpjM/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2536 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1192 2024-10-12_d5e0f7c8090351abd709154d0b9166e5_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_d5e0f7c8090351abd709154d0b9166e5_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1192 wrote to memory of 2536 1192 2024-10-12_d5e0f7c8090351abd709154d0b9166e5_cryptolocker.exe 30 PID 1192 wrote to memory of 2536 1192 2024-10-12_d5e0f7c8090351abd709154d0b9166e5_cryptolocker.exe 30 PID 1192 wrote to memory of 2536 1192 2024-10-12_d5e0f7c8090351abd709154d0b9166e5_cryptolocker.exe 30 PID 1192 wrote to memory of 2536 1192 2024-10-12_d5e0f7c8090351abd709154d0b9166e5_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_d5e0f7c8090351abd709154d0b9166e5_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-12_d5e0f7c8090351abd709154d0b9166e5_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD56f14c9e49e07b45b0da4e9ff347909bd
SHA1b5a22b5975351dfeff5717ac782a7acf8b0dfbe0
SHA256ce1eadfb79dba21c98cb3e5ae75fa172c2e0faa4db30f91cac17592c29f0889d
SHA5126ea19f614b3c015c87b5045ed7c9524e0336af014928370b6ac1be04652a199455744e818c37b8a78c5743766a1d042dd2c795be38fa95c21bfbe6d12bc1477d