Analysis
-
max time kernel
132s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 23:03
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-17_e2a0d25c347c082c16c2ffcc672bddb7_cryptolocker.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-17_e2a0d25c347c082c16c2ffcc672bddb7_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-17_e2a0d25c347c082c16c2ffcc672bddb7_cryptolocker.exe
-
Size
57KB
-
MD5
e2a0d25c347c082c16c2ffcc672bddb7
-
SHA1
4de4d1401edcb9be24f3251d71cf0481eb00051c
-
SHA256
ca0887ed84eccdca31adc636bcb2b0c90ee8268d98ecafa4c3435ad8650208e1
-
SHA512
74fa8ccd760734a84cc4293c76123da7c34dcf8e771be52232ed06c22201f97350d7d8cfcaaeeb9a782fe405da36238b2a424be23f59d8dd31d36777e66e1f23
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBccD2RuoNmuBLA+RD:X6a+SOtEvwDpjBrOv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2584 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2620 2024-10-17_e2a0d25c347c082c16c2ffcc672bddb7_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-17_e2a0d25c347c082c16c2ffcc672bddb7_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2584 2620 2024-10-17_e2a0d25c347c082c16c2ffcc672bddb7_cryptolocker.exe 30 PID 2620 wrote to memory of 2584 2620 2024-10-17_e2a0d25c347c082c16c2ffcc672bddb7_cryptolocker.exe 30 PID 2620 wrote to memory of 2584 2620 2024-10-17_e2a0d25c347c082c16c2ffcc672bddb7_cryptolocker.exe 30 PID 2620 wrote to memory of 2584 2620 2024-10-17_e2a0d25c347c082c16c2ffcc672bddb7_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-17_e2a0d25c347c082c16c2ffcc672bddb7_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-17_e2a0d25c347c082c16c2ffcc672bddb7_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5f69e9344d022bfbd72a3f5c9e3db9a4d
SHA11a18a874fec9414f1652a2b765c92496feaea2bb
SHA25640621eefe3c40acd3a0910d5a35c6fa5142e13202cd9490d52a23e54c6d525e1
SHA5128bf87bbda770db376fb02450a14ea1c2b07f09b12a7d209d603f354b54c6327690b69c152ea6fc5453d232a2b9ee32c4fcfaf71dac56d22b7ecc53bfe218da0e