Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 03:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_0372b3c7ed93a06b86635b37b1dabbb3_cryptolocker.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-12_0372b3c7ed93a06b86635b37b1dabbb3_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_0372b3c7ed93a06b86635b37b1dabbb3_cryptolocker.exe
-
Size
57KB
-
MD5
0372b3c7ed93a06b86635b37b1dabbb3
-
SHA1
ac5882e0b0619c9b549c1fc1b8105ac976041abf
-
SHA256
fd173039c46e56a1b8518f76e0e1eb98ca1bc2b0358f729a2ad47058ca4198b8
-
SHA512
257b873ae581823b68d77171aa9df2dc9dec13abdb7afcb2df71525def7bebde1db2498eed580a35589e9618bd5b21de3b2f963db003097e0990bbadc69cb908
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5I52kGv:6j+1NMOtEvwDpjr8ox8UDv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2916 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2136 2024-10-12_0372b3c7ed93a06b86635b37b1dabbb3_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_0372b3c7ed93a06b86635b37b1dabbb3_cryptolocker.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2916 2136 2024-10-12_0372b3c7ed93a06b86635b37b1dabbb3_cryptolocker.exe 31 PID 2136 wrote to memory of 2916 2136 2024-10-12_0372b3c7ed93a06b86635b37b1dabbb3_cryptolocker.exe 31 PID 2136 wrote to memory of 2916 2136 2024-10-12_0372b3c7ed93a06b86635b37b1dabbb3_cryptolocker.exe 31 PID 2136 wrote to memory of 2916 2136 2024-10-12_0372b3c7ed93a06b86635b37b1dabbb3_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_0372b3c7ed93a06b86635b37b1dabbb3_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-12_0372b3c7ed93a06b86635b37b1dabbb3_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5dd7140fd060fac2f187fefa983a3a77b
SHA157bf8a72edd01bfa350f6f2fd6228e2a94d59395
SHA256e263c735fe619358cf5f8617c812969554167923735f41b4f800073d25e5de6a
SHA512fee88f6bbda659a9718e7f68e9bb6f41b614bb34c3ec01262d2a0fbb938914600e171b5055efcb736402432bdd9d8af7c2dfc8d905f39c85e86cb57876d064b1