Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-15_3dda2ad5f5e805581dea3e5794372ec9_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-15_3dda2ad5f5e805581dea3e5794372ec9_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-15_3dda2ad5f5e805581dea3e5794372ec9_cryptolocker.exe
-
Size
120KB
-
MD5
3dda2ad5f5e805581dea3e5794372ec9
-
SHA1
a9af54424146ba2b78909491c010f6006aac62cb
-
SHA256
5cae18a77a8d80052181fa17aea243ea303aa95f90e13c78fb4bbdc20d4f3bd2
-
SHA512
7ceb68c9ac6dfcac9417fb5e8a2d66a01d5df8df7acc43f4eb9b7a2ef07c8b1338752a2c1d574c6dea234c3c23877eec09fb1c3dfb3cef66a2165b00b1b00fc8
-
SSDEEP
768:gUQz7yVEhs9+4T/1bytOOtEvwDpjNbZ7uyA36S7MpxRIIXVe3mU9TYwlOBTzS:gUj+AIMOtEvwDpjNbwQEIPlemUhYjS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2956 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2056 2024-10-15_3dda2ad5f5e805581dea3e5794372ec9_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-15_3dda2ad5f5e805581dea3e5794372ec9_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2956 2056 2024-10-15_3dda2ad5f5e805581dea3e5794372ec9_cryptolocker.exe 30 PID 2056 wrote to memory of 2956 2056 2024-10-15_3dda2ad5f5e805581dea3e5794372ec9_cryptolocker.exe 30 PID 2056 wrote to memory of 2956 2056 2024-10-15_3dda2ad5f5e805581dea3e5794372ec9_cryptolocker.exe 30 PID 2056 wrote to memory of 2956 2056 2024-10-15_3dda2ad5f5e805581dea3e5794372ec9_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-15_3dda2ad5f5e805581dea3e5794372ec9_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-15_3dda2ad5f5e805581dea3e5794372ec9_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5eab763d3ba0dacdd9410dbdba7df1bdc
SHA1f3708a74a240f18a10b910eb0b9e4401336a64f7
SHA25660b79cd02a7fadde27ec46f7251256bf1b3a9b203e6d5ba4430f3f0f58f05986
SHA512bb5774759a56f7b3852073c3974f8b8cada8d28045e9d6c3df92a0b9eb749b5d9386e37b4b4abd341336a59728dfcdac9a6a0290312a96ceb5801049a485e65e