Analysis
-
max time kernel
131s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-18_69bfeb11ff38b9ad25829d1d6fccb0bc_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-18_69bfeb11ff38b9ad25829d1d6fccb0bc_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-18_69bfeb11ff38b9ad25829d1d6fccb0bc_cryptolocker.exe
-
Size
53KB
-
MD5
69bfeb11ff38b9ad25829d1d6fccb0bc
-
SHA1
f250debcfe9970130fec0b6876b05536b9a26db1
-
SHA256
bc44b629b2963fdff2bdf05d0af98ad07e7f3ac34e3c3dd6861ae322b4333886
-
SHA512
b79e327caf2ab67cb32dc14afb689725a13dd1411f96c6db54624bf953d13a3ac2559cf5316f84572c10ded2c745152b537d8828ccaa6ed6852eb9ec86dca8b4
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjyaLccCGXl9niNs:V6a+pOtEvwDpjvDf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2472 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1324 2024-10-18_69bfeb11ff38b9ad25829d1d6fccb0bc_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-18_69bfeb11ff38b9ad25829d1d6fccb0bc_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1324 wrote to memory of 2472 1324 2024-10-18_69bfeb11ff38b9ad25829d1d6fccb0bc_cryptolocker.exe 31 PID 1324 wrote to memory of 2472 1324 2024-10-18_69bfeb11ff38b9ad25829d1d6fccb0bc_cryptolocker.exe 31 PID 1324 wrote to memory of 2472 1324 2024-10-18_69bfeb11ff38b9ad25829d1d6fccb0bc_cryptolocker.exe 31 PID 1324 wrote to memory of 2472 1324 2024-10-18_69bfeb11ff38b9ad25829d1d6fccb0bc_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-18_69bfeb11ff38b9ad25829d1d6fccb0bc_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-18_69bfeb11ff38b9ad25829d1d6fccb0bc_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD54a2a3d75f22c65593726d0574c76a902
SHA149e0b3180d65f7c3d17be85e3ce45d8c0735c84a
SHA256733e766e8d192e97652de46f3197967345fc3e5170b668d3cd94c562d3eba200
SHA5120283698c3580e96ae8154fdf6dda713a607d37ef1df2c07d222fe518167421808d35bd85e2ae9f3818aec94b9b62a4191cc18c3ed138e6d72f632447bed94d8b