Analysis
-
max time kernel
132s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 00:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-13_b7efdeb098667f517b97288ef1a3f1df_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-13_b7efdeb098667f517b97288ef1a3f1df_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-13_b7efdeb098667f517b97288ef1a3f1df_cryptolocker.exe
-
Size
35KB
-
MD5
b7efdeb098667f517b97288ef1a3f1df
-
SHA1
e890c8545d913de075b5e50ff98a6164a3a85d42
-
SHA256
2a634060f2dc1cd9e27d2e9c4ca57f18e1a85cae5282e6389fe9b92b6e1b61dc
-
SHA512
d24eb5a6174f5a50fc54d88b65177a83d4e4a965b48d68beaf47d00dd187af8ddfd02e6e7873a76c2480731662a4d723ed3fc0e2d47e35b07509d8e169c499d9
-
SSDEEP
768:wHGGaSawqnwjRQ6ESlmFOsPoOdQtOOtEvwDpjm6WaJIOc+UPPEYv:YGzl5wjRQBBOsP1QMOtEvwDpjgarrA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1856 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2336 2024-10-13_b7efdeb098667f517b97288ef1a3f1df_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-13_b7efdeb098667f517b97288ef1a3f1df_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1856 2336 2024-10-13_b7efdeb098667f517b97288ef1a3f1df_cryptolocker.exe 30 PID 2336 wrote to memory of 1856 2336 2024-10-13_b7efdeb098667f517b97288ef1a3f1df_cryptolocker.exe 30 PID 2336 wrote to memory of 1856 2336 2024-10-13_b7efdeb098667f517b97288ef1a3f1df_cryptolocker.exe 30 PID 2336 wrote to memory of 1856 2336 2024-10-13_b7efdeb098667f517b97288ef1a3f1df_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_b7efdeb098667f517b97288ef1a3f1df_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-13_b7efdeb098667f517b97288ef1a3f1df_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD53eb865b064568f51322ac64f8fca72e5
SHA122ffe8d42b4d4771d61b6ee62262075cf98296f4
SHA2569df66a4e0a534eeb688dc069e0280c35346d1806b80644e8f14a33902169a130
SHA512cd220ac575a2a764b7e437936b14e07178af5166bc88c8dd4b2091cc58ad40131e5e1f6da4dca38932f78b2530d5f2de175dba0c0bd16ea5597817650573bdf2