Analysis
-
max time kernel
133s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 02:31
Behavioral task
behavioral1
Sample
2024-10-13_b355bde004b1ed2c81cd808f6adad360_cryptolocker.exe
Resource
win7-20241010-en
General
-
Target
2024-10-13_b355bde004b1ed2c81cd808f6adad360_cryptolocker.exe
-
Size
59KB
-
MD5
b355bde004b1ed2c81cd808f6adad360
-
SHA1
fe54496af8f81bb17013c6fad9508800d375376d
-
SHA256
adf79ad668d77ba133223954f07c834576aeb5d00c5fb40622bff6f21e5a9628
-
SHA512
fecc5ddb294bfa1f05a0cec1ecfb4d7b2422754615d73f9fc39b7f1f46fed46f322d1e267e88f154c184ffe19885c47f8aa01f3877834ce58102b2e15451cbd1
-
SSDEEP
768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP6p6:H6QFElP6n+gou9cvMOtEvwDpjCpVXw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1936 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2356 2024-10-13_b355bde004b1ed2c81cd808f6adad360_cryptolocker.exe -
resource yara_rule behavioral1/files/0x000c000000012262-25.dat upx behavioral1/memory/2356-16-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2356-13-0x0000000001E20000-0x0000000001E30000-memory.dmp upx behavioral1/memory/2356-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1936-26-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-13_b355bde004b1ed2c81cd808f6adad360_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 1936 2356 2024-10-13_b355bde004b1ed2c81cd808f6adad360_cryptolocker.exe 30 PID 2356 wrote to memory of 1936 2356 2024-10-13_b355bde004b1ed2c81cd808f6adad360_cryptolocker.exe 30 PID 2356 wrote to memory of 1936 2356 2024-10-13_b355bde004b1ed2c81cd808f6adad360_cryptolocker.exe 30 PID 2356 wrote to memory of 1936 2356 2024-10-13_b355bde004b1ed2c81cd808f6adad360_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_b355bde004b1ed2c81cd808f6adad360_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-13_b355bde004b1ed2c81cd808f6adad360_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5066bb0412dcbca236a2cc5ce745784c5
SHA12d67342887cb93a1476ea75e7d10da63e5265a4e
SHA2566ceeb7890dda6c04b6a29f658a72c2a02c572bdc48082460f69fa29241675c25
SHA512f3e1444337583b913cd0cdc37cd66695cce40452c1de4387cfe0bc880af43ee6441adbded4166fcdf6d39f6ab8cc11c63cf6c274772b2837448a397d63a1298d