Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 00:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-18_c5df63c3bb7c57fcf52ed1675c412a8e_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-18_c5df63c3bb7c57fcf52ed1675c412a8e_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-18_c5df63c3bb7c57fcf52ed1675c412a8e_cryptolocker.exe
-
Size
45KB
-
MD5
c5df63c3bb7c57fcf52ed1675c412a8e
-
SHA1
93bf56173db893c9e77cb69164ae1a472eff4d32
-
SHA256
37bff25a9264e6c12319c838bffd25e015ff63121700c4669415b427c780cd95
-
SHA512
d1fb999c18ef5d3d8b4fd4e1645170f906395faf0934fd5a745968a4659a5ce91a24eb9a1b04ae53d5010d165c663d1133246cd9bb8f94a2b4e7d4faab720f51
-
SSDEEP
384:icX+ni9VCr5nQI021q4VQBqURYp055TOtOOtEvwDpjqIGR/hHi7/OlI0G/Bdz7:XS5nQJ24LR1bytOOtEvwDpjNbP/b3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2320 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2520 2024-10-18_c5df63c3bb7c57fcf52ed1675c412a8e_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-18_c5df63c3bb7c57fcf52ed1675c412a8e_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2320 2520 2024-10-18_c5df63c3bb7c57fcf52ed1675c412a8e_cryptolocker.exe 30 PID 2520 wrote to memory of 2320 2520 2024-10-18_c5df63c3bb7c57fcf52ed1675c412a8e_cryptolocker.exe 30 PID 2520 wrote to memory of 2320 2520 2024-10-18_c5df63c3bb7c57fcf52ed1675c412a8e_cryptolocker.exe 30 PID 2520 wrote to memory of 2320 2520 2024-10-18_c5df63c3bb7c57fcf52ed1675c412a8e_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-18_c5df63c3bb7c57fcf52ed1675c412a8e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-18_c5df63c3bb7c57fcf52ed1675c412a8e_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5b6ab2359a014c9bed6dac9de3a85d64f
SHA1059abe36b14753c9cca9e794e905c16c6eb34d7c
SHA256e843f124271863924cc010f26751d619bdbebbfae734b1dd8e1345b15252e270
SHA512868bcdaad2d151eeb7c212067df9735eddc28390bfdf44fb6c22ea5fb616b9f8c24e4359311d20a598374ba7cfa67be57f61b6676f2cff7ff575b59b5c2b065d