Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 08:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-13_e1114a3737935239d9b6b702f8378d40_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-13_e1114a3737935239d9b6b702f8378d40_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-13_e1114a3737935239d9b6b702f8378d40_cryptolocker.exe
-
Size
67KB
-
MD5
e1114a3737935239d9b6b702f8378d40
-
SHA1
cca097060cf997518f4fa001b86ce47a477dd921
-
SHA256
728a5b17c8dc3e25359cd1df788b2411a1593c80fd03c9fd3a52498b8df3f288
-
SHA512
3cab6a3322e4337ed6a17bc9859254265732923368b7e7a72758d4f00ef2ae4432c0bd35138649a786e450c27b6344e4655b9445ef68dca5f5cc6daa26e593e9
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsijY:BbdDmjr+OtEvwDpjM8V
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2820 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2316 2024-10-13_e1114a3737935239d9b6b702f8378d40_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-13_e1114a3737935239d9b6b702f8378d40_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2820 2316 2024-10-13_e1114a3737935239d9b6b702f8378d40_cryptolocker.exe 30 PID 2316 wrote to memory of 2820 2316 2024-10-13_e1114a3737935239d9b6b702f8378d40_cryptolocker.exe 30 PID 2316 wrote to memory of 2820 2316 2024-10-13_e1114a3737935239d9b6b702f8378d40_cryptolocker.exe 30 PID 2316 wrote to memory of 2820 2316 2024-10-13_e1114a3737935239d9b6b702f8378d40_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_e1114a3737935239d9b6b702f8378d40_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-13_e1114a3737935239d9b6b702f8378d40_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5908ddee29c3943070ea809b71a597c71
SHA15166e600ae15e6d0dedd5dc12f18c2a883e5a947
SHA256aa70429c43afa39eaa5fb4562df708ff76ce0d66fba7d0f9ea02e0c8f165721a
SHA512207d31bf3c0b5dda7ab3de0012bd3fed976e60d4817122f91475598ec0bac48b54167cdb8ee444b3f492bcb8e4de766473e8dc407bf3f4767de583cd7dd23b3e