Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_d3077f56316516e158dcf971ccb287c1_cryptolocker.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-10-12_d3077f56316516e158dcf971ccb287c1_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_d3077f56316516e158dcf971ccb287c1_cryptolocker.exe
-
Size
56KB
-
MD5
d3077f56316516e158dcf971ccb287c1
-
SHA1
d9a1a2db7501feb044dbe383b225bdda5f9e0d98
-
SHA256
51eb66c5fb826c9abdc8b9b51c53dec909ce9b0b5c8abf318143b94c5cbe29e4
-
SHA512
314ea53265772bdf4fc4b338c3d34aa87c60db6791fbfdec9980a7617ae4e0442b4e4e5ab49f5c0f85a1754a8e01c35694431c782137e9d8105fe7997366d02e
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5QJz7/eUl:6j+1NMOtEvwDpjr8oxExei
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2204 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1308 2024-10-12_d3077f56316516e158dcf971ccb287c1_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_d3077f56316516e158dcf971ccb287c1_cryptolocker.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1308 wrote to memory of 2204 1308 2024-10-12_d3077f56316516e158dcf971ccb287c1_cryptolocker.exe 29 PID 1308 wrote to memory of 2204 1308 2024-10-12_d3077f56316516e158dcf971ccb287c1_cryptolocker.exe 29 PID 1308 wrote to memory of 2204 1308 2024-10-12_d3077f56316516e158dcf971ccb287c1_cryptolocker.exe 29 PID 1308 wrote to memory of 2204 1308 2024-10-12_d3077f56316516e158dcf971ccb287c1_cryptolocker.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_d3077f56316516e158dcf971ccb287c1_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-12_d3077f56316516e158dcf971ccb287c1_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5b7c6185904becef2c115eacb88cae721
SHA10063f035bff5f3051e74d3a3909c953a192f9cc6
SHA2567973645763dbc39e80e5e837d76cb990d0757e176c53d4f95da57af93bcbcac4
SHA512fb3cbfc0828278434ae7726972fa89d1b699e02f2761eb1e07ef2174308c9e82b037ad0a5994442fa43a91bb8881749435a0f11cfbdddf463b2d2d56a7715638