Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-15_5d4867e2967d5001489dc607d500bd84_cryptolocker.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-15_5d4867e2967d5001489dc607d500bd84_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-15_5d4867e2967d5001489dc607d500bd84_cryptolocker.exe
-
Size
49KB
-
MD5
5d4867e2967d5001489dc607d500bd84
-
SHA1
1b997b525fcaa2cf90e6973de6e513748be61e6a
-
SHA256
308fcaa37bae929c041d2b56752307dbaa84ed157d8b5daf5809760f495c2f4b
-
SHA512
872c566e7b618c511b89378bd812f5a20852258592f0451b8028d557d46cf1ed648633e0facfa93196b13b7c8c2c4a780cc11cffdea76b2167a59e3e60c18d29
-
SSDEEP
768:P6LsoVEeegiZPvEhHSP+gp/QtOOtEvwDpjBBMLZdzuqpXsiE8Wq/DpkcAU:P6Q0ElP6G+gJQMOtEvwDpjB8WMlfp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2244 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2876 2024-10-15_5d4867e2967d5001489dc607d500bd84_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-15_5d4867e2967d5001489dc607d500bd84_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2244 2876 2024-10-15_5d4867e2967d5001489dc607d500bd84_cryptolocker.exe 30 PID 2876 wrote to memory of 2244 2876 2024-10-15_5d4867e2967d5001489dc607d500bd84_cryptolocker.exe 30 PID 2876 wrote to memory of 2244 2876 2024-10-15_5d4867e2967d5001489dc607d500bd84_cryptolocker.exe 30 PID 2876 wrote to memory of 2244 2876 2024-10-15_5d4867e2967d5001489dc607d500bd84_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-15_5d4867e2967d5001489dc607d500bd84_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-15_5d4867e2967d5001489dc607d500bd84_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD51d33dc998ae1e4fe1cc90525d28420f1
SHA12109b36f12c172274c3c6be7de44dbd6cc57c632
SHA2569401dc7700afdeb11660109ca64013d379cc28f56ddeec5912f92a5574ce78d5
SHA512789de02cdf25e958ef225e44a9b51e9c157015716573cfa6315284b1ac69d5ab3d6d138095fd2e1b92cce6fc440af1bb90aee112529b4bb5215888ec4b8e9641