Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 11:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-17_00f39eedda7081b7a2d3b83360bf0bf3_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-17_00f39eedda7081b7a2d3b83360bf0bf3_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-17_00f39eedda7081b7a2d3b83360bf0bf3_cryptolocker.exe
-
Size
44KB
-
MD5
00f39eedda7081b7a2d3b83360bf0bf3
-
SHA1
979018689e45f62739f9c802be7e9aabc47f6a3d
-
SHA256
3f062405c6f5f1d1a40440e2a59b09a18d31fc8008208120e4399e1f8140c09b
-
SHA512
d91f12d01863ec93051150eb318a4ba8235ab2733431f0ba3dd261130f08d19b63629b00ffd303e2d698d8c8214a0f499db6dbce473e85c96fd886bce116c899
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WtyU8P:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2776 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 3048 2024-10-17_00f39eedda7081b7a2d3b83360bf0bf3_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-17_00f39eedda7081b7a2d3b83360bf0bf3_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2776 3048 2024-10-17_00f39eedda7081b7a2d3b83360bf0bf3_cryptolocker.exe 30 PID 3048 wrote to memory of 2776 3048 2024-10-17_00f39eedda7081b7a2d3b83360bf0bf3_cryptolocker.exe 30 PID 3048 wrote to memory of 2776 3048 2024-10-17_00f39eedda7081b7a2d3b83360bf0bf3_cryptolocker.exe 30 PID 3048 wrote to memory of 2776 3048 2024-10-17_00f39eedda7081b7a2d3b83360bf0bf3_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-17_00f39eedda7081b7a2d3b83360bf0bf3_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-17_00f39eedda7081b7a2d3b83360bf0bf3_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD58c725ce6bd6fb51b21fd34d2f4adc119
SHA19f275aba8c0e0332657eb8327159f439cd499ac7
SHA256bcf36fbc7c0c43929d1179f0ccdc9ebbdc66bbce73fe7466543f6c9e46aeeec7
SHA5120e69f5f46477b49884c0548b0c935b388e490dff97b082e4348f0b22a6500a1293952e475ba24354550541ef9839bb250d8bf0eb1c123ba9c01eeb7bcf993924