Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 02:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-14_8081452e49d089eba7ff3e5cc19967a0_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-10-14_8081452e49d089eba7ff3e5cc19967a0_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-14_8081452e49d089eba7ff3e5cc19967a0_cryptolocker.exe
-
Size
28KB
-
MD5
8081452e49d089eba7ff3e5cc19967a0
-
SHA1
b768d47b2e18f2b53443799e9113787178e912af
-
SHA256
43acf73bcf2de48e637da66fa5a92e568ef54ad887d688f60382938b1e3ae838
-
SHA512
49b3e1fa27a232c32860f354cb7297dd490e64f77d021e4793ff0fc6e754cf2decaae8532fd36b8c35b0865e907398fdb4cbe11ef60d9bcf7553621dd9c732bd
-
SSDEEP
768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIO/xl:q0zizzOSxMOtEvwDpj/arb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2892 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2360 2024-10-14_8081452e49d089eba7ff3e5cc19967a0_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-14_8081452e49d089eba7ff3e5cc19967a0_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2892 2360 2024-10-14_8081452e49d089eba7ff3e5cc19967a0_cryptolocker.exe 29 PID 2360 wrote to memory of 2892 2360 2024-10-14_8081452e49d089eba7ff3e5cc19967a0_cryptolocker.exe 29 PID 2360 wrote to memory of 2892 2360 2024-10-14_8081452e49d089eba7ff3e5cc19967a0_cryptolocker.exe 29 PID 2360 wrote to memory of 2892 2360 2024-10-14_8081452e49d089eba7ff3e5cc19967a0_cryptolocker.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_8081452e49d089eba7ff3e5cc19967a0_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-14_8081452e49d089eba7ff3e5cc19967a0_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD562196eac7fc5fd7c876594364812b07c
SHA137ded9d53acbcfae8ccb1fc9065902c633d5e6f8
SHA2563ff3905c69d4e0b796fc15a0140f71fb2b608b7fd98013a8688920c55aa11ffd
SHA512fb47c454dbc2ee1b1cd22788a1fc820bd880e06867a4bf2b59542f2bdb6cca77a58dfc9c4376d7e6c65fc661b958ab0a2a03a5d537abf12c854a49eb3df591c3