Analysis
-
max time kernel
132s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 08:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_0acc35c472e080dadcce0e6c27916b94_cryptolocker.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-12_0acc35c472e080dadcce0e6c27916b94_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_0acc35c472e080dadcce0e6c27916b94_cryptolocker.exe
-
Size
50KB
-
MD5
0acc35c472e080dadcce0e6c27916b94
-
SHA1
702804d7f49d828ddf234bfd704097e38bbf6c4c
-
SHA256
bea884bde861072702407da032c96ef3c261af57ca6c8f5e887f6353bc052bbf
-
SHA512
fdd849f61b8ae344d823fcf88a4f52adfa61cf648278c6d2e5e9a216098d7d133a74d24d58d31896fc329347a375d9e971a58ba0062b1c615e48cca312435843
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/BtOOtEvwDpjBVaD3E09vdXfOs:X6QFElP6n+gJBMOtEvwDpjBtEdXfOs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1748 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1712 2024-10-12_0acc35c472e080dadcce0e6c27916b94_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_0acc35c472e080dadcce0e6c27916b94_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1748 1712 2024-10-12_0acc35c472e080dadcce0e6c27916b94_cryptolocker.exe 30 PID 1712 wrote to memory of 1748 1712 2024-10-12_0acc35c472e080dadcce0e6c27916b94_cryptolocker.exe 30 PID 1712 wrote to memory of 1748 1712 2024-10-12_0acc35c472e080dadcce0e6c27916b94_cryptolocker.exe 30 PID 1712 wrote to memory of 1748 1712 2024-10-12_0acc35c472e080dadcce0e6c27916b94_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_0acc35c472e080dadcce0e6c27916b94_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-12_0acc35c472e080dadcce0e6c27916b94_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5aad5d5a361302281b9b3b78cb06e6a48
SHA141aecea734cd713ccc28e5382bb8e0be904bd177
SHA2568903b802d69a4a74570b5455e3f790f631cd0a7123718d67bdb81df088b3c5c7
SHA5126e70dbd879df56aa20ecf83b7c5fef1f9cdee797826d9f19d21c1f549a9f94a7f65980651a0ec1fcb3a39999f4292fcd6489485d39137b475c3d1bf4c1dbdd8d