Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-18_9330e795ec10b42efc6f1760b0bc4391_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-18_9330e795ec10b42efc6f1760b0bc4391_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-18_9330e795ec10b42efc6f1760b0bc4391_cryptolocker.exe
-
Size
51KB
-
MD5
9330e795ec10b42efc6f1760b0bc4391
-
SHA1
3b5dbe74466721b2dd2917ecccd86b0407d7d82c
-
SHA256
edf4e89d359efc84a5e38ab68c331ddaf19b7cb50180e2a23cabe7133598ba66
-
SHA512
8a555baa070dfcf2d0588ba52544e955b1c29858d73c63efcc9b5f7d1a4ab8ac86301004566dcf0585727b511c39fb87a754d8500ed3908cb4be357b70e2d85a
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5QC:6j+1NMOtEvwDpjr8oxEC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1600 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2776 2024-10-18_9330e795ec10b42efc6f1760b0bc4391_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-18_9330e795ec10b42efc6f1760b0bc4391_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 1600 2776 2024-10-18_9330e795ec10b42efc6f1760b0bc4391_cryptolocker.exe 31 PID 2776 wrote to memory of 1600 2776 2024-10-18_9330e795ec10b42efc6f1760b0bc4391_cryptolocker.exe 31 PID 2776 wrote to memory of 1600 2776 2024-10-18_9330e795ec10b42efc6f1760b0bc4391_cryptolocker.exe 31 PID 2776 wrote to memory of 1600 2776 2024-10-18_9330e795ec10b42efc6f1760b0bc4391_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-18_9330e795ec10b42efc6f1760b0bc4391_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-18_9330e795ec10b42efc6f1760b0bc4391_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD50b8bf4290ce2643739be7d14279e3f05
SHA109ecf70af6e830e0006c9dbcf63a9e18dc13b9c4
SHA2564820575652bc006008fe744fdde6ecc9ad7a51f8e66381c8f5978ca3d8d82125
SHA512406066d06ce587d573bef5707c5c72aa3579982c46528b0550deb5d5b64c2c57214d46b81c0b3aff021642b4aa5403aa88dfffe8a0aa20a032dd4b39835b8041