Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 00:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-13_3bff208486a6aee19690d8c0965d1b44_cryptolocker.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-13_3bff208486a6aee19690d8c0965d1b44_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-13_3bff208486a6aee19690d8c0965d1b44_cryptolocker.exe
-
Size
44KB
-
MD5
3bff208486a6aee19690d8c0965d1b44
-
SHA1
03a18041b484275b9c4808f69e589920103d8f51
-
SHA256
aac59ebc12920491ccf35c087c3de06eb8d22e9554b3ed24fc189f22cc33eecf
-
SHA512
4cd961952dbd079812f905aae9d40840582232bc099ae59f62f86e14c0461954d398ddbb08c98ad296af14c54327aa22f7e3da92e1dabaf2905b10d0c42da2bc
-
SSDEEP
768:lQz7yVEhs9+4uR1bytOOtEvwDpjWE6BLbjG9RT6:lj+VGMOtEvwDpjy+e
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2852 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2124 2024-10-13_3bff208486a6aee19690d8c0965d1b44_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-13_3bff208486a6aee19690d8c0965d1b44_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2852 2124 2024-10-13_3bff208486a6aee19690d8c0965d1b44_cryptolocker.exe 29 PID 2124 wrote to memory of 2852 2124 2024-10-13_3bff208486a6aee19690d8c0965d1b44_cryptolocker.exe 29 PID 2124 wrote to memory of 2852 2124 2024-10-13_3bff208486a6aee19690d8c0965d1b44_cryptolocker.exe 29 PID 2124 wrote to memory of 2852 2124 2024-10-13_3bff208486a6aee19690d8c0965d1b44_cryptolocker.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_3bff208486a6aee19690d8c0965d1b44_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-13_3bff208486a6aee19690d8c0965d1b44_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD511be98636af6a5e0f505303b6457d949
SHA151f6d47cb0d82f7df5604485f060d40c6bbf565a
SHA2568a108f523adb91ef41841dc780ae3d830cf1644408c7f982915cf75c0bac9b30
SHA51203b58559163090ac81c8ff451bed28307f9c52847e0fe942694b1f0fa3568830b2eef8a62cccc923eb7ddbe7e90e6af3ef54913189eae690b48fd661b5678eff