Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 20:45
Behavioral task
behavioral1
Sample
2024-10-14_fac964691c02085ca0ca3e821e0b38f9_cryptolocker.exe
Resource
win7-20240708-en
General
-
Target
2024-10-14_fac964691c02085ca0ca3e821e0b38f9_cryptolocker.exe
-
Size
82KB
-
MD5
fac964691c02085ca0ca3e821e0b38f9
-
SHA1
d4fce9daa1f0c2134cff53fcc83230b67f6cd417
-
SHA256
2659d30fe3bcb2cae7f769e0d6f238309124d8d317dc6a583e5f7a8fd95debbf
-
SHA512
e314d14a815f523e9b17a2bdfabd27df18107e3559d873672309ad711755bc4d00715292d304ea3ccf1e3d9594fa403b5bfb9196ceda5ba59ba9aa3d5bbe5979
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Qu+:zCsanOtEvwDpj9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2736 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2332 2024-10-14_fac964691c02085ca0ca3e821e0b38f9_cryptolocker.exe -
resource yara_rule behavioral1/memory/2332-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000900000001225f-11.dat upx behavioral1/memory/2736-16-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2332-15-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2736-25-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-14_fac964691c02085ca0ca3e821e0b38f9_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2736 2332 2024-10-14_fac964691c02085ca0ca3e821e0b38f9_cryptolocker.exe 31 PID 2332 wrote to memory of 2736 2332 2024-10-14_fac964691c02085ca0ca3e821e0b38f9_cryptolocker.exe 31 PID 2332 wrote to memory of 2736 2332 2024-10-14_fac964691c02085ca0ca3e821e0b38f9_cryptolocker.exe 31 PID 2332 wrote to memory of 2736 2332 2024-10-14_fac964691c02085ca0ca3e821e0b38f9_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_fac964691c02085ca0ca3e821e0b38f9_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-14_fac964691c02085ca0ca3e821e0b38f9_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD500c7cc707dddbc967935d7ab3a06f3bc
SHA1287ca024003ce53e4c1a2822bbf5383a5ede4937
SHA256fb6c44ead5d436a339176b110da8225f9883f694d04e1649f0c79fce3f34cbc6
SHA5121efa9c4c23d06f102c4d4f21245be88c7ca122819093953a0b5c26491757c0b2b03c991f8a814b1b4f75690f98e1c308eeb9c9840f9e8d502cade6a9ac0c0bd7