Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 02:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-13_ed2014b523822d6df88fdd72123ef721_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-13_ed2014b523822d6df88fdd72123ef721_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-13_ed2014b523822d6df88fdd72123ef721_cryptolocker.exe
-
Size
47KB
-
MD5
ed2014b523822d6df88fdd72123ef721
-
SHA1
a289d92acf465d44bf011145dc69cdbd443e6b72
-
SHA256
c1273a0abbbc9dcefc29e177f56e9b7f84416e119f6a7920026baad1c7bb7fb6
-
SHA512
eda4cfba9cd5d802ddb9b7302711a46bac67f01aab0e44379ca2551694e01ddc10836997355fa2556e0355c783f9eddf40868d35fbc0d5e76b744da77828d15f
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/aMDhkJlq:6j+1NMOtEvwDpjrRraJs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2688 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2628 2024-10-13_ed2014b523822d6df88fdd72123ef721_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-13_ed2014b523822d6df88fdd72123ef721_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2628 wrote to memory of 2688 2628 2024-10-13_ed2014b523822d6df88fdd72123ef721_cryptolocker.exe 31 PID 2628 wrote to memory of 2688 2628 2024-10-13_ed2014b523822d6df88fdd72123ef721_cryptolocker.exe 31 PID 2628 wrote to memory of 2688 2628 2024-10-13_ed2014b523822d6df88fdd72123ef721_cryptolocker.exe 31 PID 2628 wrote to memory of 2688 2628 2024-10-13_ed2014b523822d6df88fdd72123ef721_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ed2014b523822d6df88fdd72123ef721_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-13_ed2014b523822d6df88fdd72123ef721_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5d1163b6d608388804e16c638786e2b91
SHA1c86d157451cd6044f6c49d77331b061d59890816
SHA2564a3ffb588a167883a76b1e019a491edb3080ab48394259fcddfe5c16fcec8222
SHA512ffbe9f5ae0599771f40d78d7ca473499451daa0b641660448b145000222a505c14db285e30037075e9c0a0f397801dad60c01a93b43f10295dc18086cdd85a7d