Analysis
-
max time kernel
132s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 00:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-13_5f133a79918bef9376544d3a2ce9d1fd_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-10-13_5f133a79918bef9376544d3a2ce9d1fd_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-13_5f133a79918bef9376544d3a2ce9d1fd_cryptolocker.exe
-
Size
61KB
-
MD5
5f133a79918bef9376544d3a2ce9d1fd
-
SHA1
4f778270988aade0903f6312fb9a629b62be92f7
-
SHA256
c99f6786cf7c2f2055e7b57f996fbdb690a44a0db6efaebbac4bf17dabc797db
-
SHA512
1d5ace656eeb258e4a37db252c180529dcfa3a9ed87dc1e6f787db8811321c37a2aba4998f4004eb4c8fccf66ff8e3d44741cee7b367d719266c96b5dcdb98d1
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5I52kGEpECg:6j+1NMOtEvwDpjr8ox8UDEpbg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1920 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1700 2024-10-13_5f133a79918bef9376544d3a2ce9d1fd_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-13_5f133a79918bef9376544d3a2ce9d1fd_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1920 1700 2024-10-13_5f133a79918bef9376544d3a2ce9d1fd_cryptolocker.exe 30 PID 1700 wrote to memory of 1920 1700 2024-10-13_5f133a79918bef9376544d3a2ce9d1fd_cryptolocker.exe 30 PID 1700 wrote to memory of 1920 1700 2024-10-13_5f133a79918bef9376544d3a2ce9d1fd_cryptolocker.exe 30 PID 1700 wrote to memory of 1920 1700 2024-10-13_5f133a79918bef9376544d3a2ce9d1fd_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_5f133a79918bef9376544d3a2ce9d1fd_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-13_5f133a79918bef9376544d3a2ce9d1fd_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5d4e93c518d2363fe98b773a62b2de7c9
SHA1e4640d2ad6d2434279de64357d5666813f5f0bf0
SHA256ce334a3870af31a08cadea49133337ab6ebf0c1aa96f4caed7135c7ac47da366
SHA512447d13856dc2a2283022cf963cdc19feef28ea29f2364fab75d1014d919be622cf12c8269c745dec6208640edcdb4bd3d0a09f9eaeb764c8fc10a44211afb329