Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 05:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-14_7ce60f66be3e218a19b90c3d91d5226c_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-14_7ce60f66be3e218a19b90c3d91d5226c_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-14_7ce60f66be3e218a19b90c3d91d5226c_cryptolocker.exe
-
Size
46KB
-
MD5
7ce60f66be3e218a19b90c3d91d5226c
-
SHA1
19b60edbc908689ddf14e4efa207f2b3f966f0bf
-
SHA256
33de0923cac8cdf173f35884c72a3547f04c17886353ad8bc0740a92306d9a30
-
SHA512
6b69fff7fb97aaccb5aefcdae91bce5eddbf6042b779dc6faea9b4d68cc9ec402189050885e077f0a0be1a933b53f0a677b5a90cca18447351c5219fe5f4d32e
-
SSDEEP
384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jb0nrlwfjDUknqcCs:bm74zYcgT/EkM0ryfjdnqcj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2708 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2980 2024-10-14_7ce60f66be3e218a19b90c3d91d5226c_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hasfj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-14_7ce60f66be3e218a19b90c3d91d5226c_cryptolocker.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2708 2980 2024-10-14_7ce60f66be3e218a19b90c3d91d5226c_cryptolocker.exe 30 PID 2980 wrote to memory of 2708 2980 2024-10-14_7ce60f66be3e218a19b90c3d91d5226c_cryptolocker.exe 30 PID 2980 wrote to memory of 2708 2980 2024-10-14_7ce60f66be3e218a19b90c3d91d5226c_cryptolocker.exe 30 PID 2980 wrote to memory of 2708 2980 2024-10-14_7ce60f66be3e218a19b90c3d91d5226c_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_7ce60f66be3e218a19b90c3d91d5226c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-14_7ce60f66be3e218a19b90c3d91d5226c_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD549b135680e0d676d48482bad934d8927
SHA186c2e57d84e78b6ed308645a60de8431331bea9c
SHA25626c28f1568efa28c3a338f48ef5be5ece84288b5c5cf34d91318c18ac73db368
SHA512ea8417d701982f186f199577e0a6f32d40afceffa0a0f59e299571bd33f62249897297a9a412f01e8b71584140e01703a7359e200547846139d8a68aef184d5a