Analysis
-
max time kernel
133s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 04:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_b86e85c6fc775730470551a065311494_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-12_b86e85c6fc775730470551a065311494_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_b86e85c6fc775730470551a065311494_cryptolocker.exe
-
Size
34KB
-
MD5
b86e85c6fc775730470551a065311494
-
SHA1
f2f96c2f84aeafc5135d683acb8263413a637524
-
SHA256
7bed4bc24e216f922d0e6ea345a537b39ed778b97729921525950d4404a385d1
-
SHA512
432081d90c02d10d368c8e4c62a3b0322888c552ce0d5fc44c508e866003dda1a9556273509a8a4ef441bf14d30f986380497a8468cb930a7905fb966062fdfb
-
SSDEEP
384:bmM0V/YPvnr801TRoUGPh4TKt6ATt1DqgPa3s/zzoi0WlLYZAM9BWixN9x7K:b7o/2n1TCraU6GD1a4X0WlK59xfx7K
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2400 rewok.exe -
Loads dropped DLL 1 IoCs
pid Process 2100 2024-10-12_b86e85c6fc775730470551a065311494_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rewok.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_b86e85c6fc775730470551a065311494_cryptolocker.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2100 2024-10-12_b86e85c6fc775730470551a065311494_cryptolocker.exe 2400 rewok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2400 2100 2024-10-12_b86e85c6fc775730470551a065311494_cryptolocker.exe 30 PID 2100 wrote to memory of 2400 2100 2024-10-12_b86e85c6fc775730470551a065311494_cryptolocker.exe 30 PID 2100 wrote to memory of 2400 2100 2024-10-12_b86e85c6fc775730470551a065311494_cryptolocker.exe 30 PID 2100 wrote to memory of 2400 2100 2024-10-12_b86e85c6fc775730470551a065311494_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_b86e85c6fc775730470551a065311494_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-12_b86e85c6fc775730470551a065311494_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD547041b8df6faaa2012feb95d19e7bbb4
SHA1395655fc4e143876fddf08813879b8658e782b91
SHA256255d56339df2a77c347dd5ba35d07681bdbf5c5713e85e29cc91973de6bdb949
SHA51246870a7e16cbe9020d20ffc668569d3651417e398aa7898d30ffb039b1a28549b7d6ad2b691b0d4c6a93be92ccf7353f953e2af311472280450d722944460c16