Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 03:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_8e3c4013c5d778537afcc36c25ce67ef_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-12_8e3c4013c5d778537afcc36c25ce67ef_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_8e3c4013c5d778537afcc36c25ce67ef_cryptolocker.exe
-
Size
43KB
-
MD5
8e3c4013c5d778537afcc36c25ce67ef
-
SHA1
9ca12719510daccb27269c64cbb0dc0f40433c7e
-
SHA256
e0ac6828677d8810cc9f6940c585bcdf6ee2672d6a0cf05ca9b845287235af9f
-
SHA512
7efa95101729002e26b19a7b0d74a4b9b869849c559c1ad7ce5d02b4966e88cf463e1baa4cfeaf3f91e54ead1bee50c2b4e7b3ab5d0ca94a97523e964884863f
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu55B:X6QFElP6n+gJQMOtEvwDpjB0GIWB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2676 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 3032 2024-10-12_8e3c4013c5d778537afcc36c25ce67ef_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_8e3c4013c5d778537afcc36c25ce67ef_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2676 3032 2024-10-12_8e3c4013c5d778537afcc36c25ce67ef_cryptolocker.exe 30 PID 3032 wrote to memory of 2676 3032 2024-10-12_8e3c4013c5d778537afcc36c25ce67ef_cryptolocker.exe 30 PID 3032 wrote to memory of 2676 3032 2024-10-12_8e3c4013c5d778537afcc36c25ce67ef_cryptolocker.exe 30 PID 3032 wrote to memory of 2676 3032 2024-10-12_8e3c4013c5d778537afcc36c25ce67ef_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_8e3c4013c5d778537afcc36c25ce67ef_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-12_8e3c4013c5d778537afcc36c25ce67ef_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5685b6e92db8b56825dbc29f9ddd94243
SHA1240b0f17194872ccad8048dec8bd961dd9c4b3e1
SHA256d0368cd96ba52e919dc82f8cb16320dba8c7bca240d29bd9a079eb2c3bb1273b
SHA512769641720b841f41ef8b889b3e022c7353a0a05e99b95b91bb76c37571ec34d17ed7f4d9f98a90f675c137c2c2fe162fd5026f973a24aa7b1ebeb69d5dbee13d