Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 07:40
Behavioral task
behavioral1
Sample
2024-10-12_49866dd9c6d69bc5fe349a40b806c0c0_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-10-12_49866dd9c6d69bc5fe349a40b806c0c0_cryptolocker.exe
-
Size
52KB
-
MD5
49866dd9c6d69bc5fe349a40b806c0c0
-
SHA1
808c279de032a06d9819ac2464d44d213d9ecd8d
-
SHA256
dde57154d3a7d86ec53d77e8de18c7b82d9bcdb5c2cc9685911ac574e420f344
-
SHA512
99974c342134aec730adf4ba1f4a2c0881b0c5b136cbf34c4fff0bec280b387bc05c527a6e335c602e317a90b56a339fbfea5c8fb118b36505a68abf76a36079
-
SSDEEP
768:bco/2n1TCraU6GD1P2wZEjbhxnbcuyD7U9kXDn62tH/1/LpP+y:b7/y28wZEjbnouy8G76iH/NLpr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2780 rewok.exe -
Loads dropped DLL 1 IoCs
pid Process 2736 2024-10-12_49866dd9c6d69bc5fe349a40b806c0c0_cryptolocker.exe -
resource yara_rule behavioral1/memory/2736-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/files/0x000a00000001227e-15.dat upx behavioral1/memory/2780-16-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_49866dd9c6d69bc5fe349a40b806c0c0_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rewok.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2736 2024-10-12_49866dd9c6d69bc5fe349a40b806c0c0_cryptolocker.exe 2780 rewok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2780 2736 2024-10-12_49866dd9c6d69bc5fe349a40b806c0c0_cryptolocker.exe 30 PID 2736 wrote to memory of 2780 2736 2024-10-12_49866dd9c6d69bc5fe349a40b806c0c0_cryptolocker.exe 30 PID 2736 wrote to memory of 2780 2736 2024-10-12_49866dd9c6d69bc5fe349a40b806c0c0_cryptolocker.exe 30 PID 2736 wrote to memory of 2780 2736 2024-10-12_49866dd9c6d69bc5fe349a40b806c0c0_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_49866dd9c6d69bc5fe349a40b806c0c0_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-12_49866dd9c6d69bc5fe349a40b806c0c0_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD58d7a982d6f9012d17388389f2a1aac69
SHA1978ec849ed9b93112a0b3b7e1c0be545aadeee97
SHA256dd17375c1d0a01eea98845543d224d4f52ae61acbd6e70181e29bd431d25dd4f
SHA512f946914ee9bed2f3104b176346437f662b9f8c072d8139fe7fc249d1b0449aac81e5b2a0d79c8c2c52c176e6572cc988d9cdd402135a0a95f972c49d1766cc8f