Analysis
-
max time kernel
132s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-13_f3eeb6d32e525775dbd5eb4c3caeb1d5_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-13_f3eeb6d32e525775dbd5eb4c3caeb1d5_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-13_f3eeb6d32e525775dbd5eb4c3caeb1d5_cryptolocker.exe
-
Size
33KB
-
MD5
f3eeb6d32e525775dbd5eb4c3caeb1d5
-
SHA1
8ea40324cecf5ab19d282dd18cd0edf0bb656e18
-
SHA256
7a875c94219424dc9f32f7aa6955604cad75f20da22a9739e17dbe401dfe8d19
-
SHA512
96453bedc1e91cf362ad335fb369da9fe2d545d472687ee449aeaa549f80dbe7bd53a46155cb041cf9301e8674e67770bc7e832c5fe75b736c6629aeb910b453
-
SSDEEP
384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzo6cJ3vdoSh:bAvJCYOOvbRPDEgXRcJN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2404 demka.exe -
Loads dropped DLL 1 IoCs
pid Process 2504 2024-10-13_f3eeb6d32e525775dbd5eb4c3caeb1d5_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-13_f3eeb6d32e525775dbd5eb4c3caeb1d5_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language demka.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2504 2024-10-13_f3eeb6d32e525775dbd5eb4c3caeb1d5_cryptolocker.exe 2404 demka.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2404 2504 2024-10-13_f3eeb6d32e525775dbd5eb4c3caeb1d5_cryptolocker.exe 30 PID 2504 wrote to memory of 2404 2504 2024-10-13_f3eeb6d32e525775dbd5eb4c3caeb1d5_cryptolocker.exe 30 PID 2504 wrote to memory of 2404 2504 2024-10-13_f3eeb6d32e525775dbd5eb4c3caeb1d5_cryptolocker.exe 30 PID 2504 wrote to memory of 2404 2504 2024-10-13_f3eeb6d32e525775dbd5eb4c3caeb1d5_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_f3eeb6d32e525775dbd5eb4c3caeb1d5_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-13_f3eeb6d32e525775dbd5eb4c3caeb1d5_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\demka.exe"C:\Users\Admin\AppData\Local\Temp\demka.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD50682321d7d0b542a0872c7fbff04ef5f
SHA10770605c6b24122c293ff3027bca7175eedf9f38
SHA256ae19a732045f5e65194646d4d29b0b694002cec0d5b8c2cecac023382b391154
SHA5127fb3b77b81f464a0c049660d33ef05f90b60c2b5a1c7564483d636bb64e8279597aabca4598b1990b6663e12c874c33b1d8907e38e08002c312daab953988962