Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 11:07
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-18_d074a02dcd2329bd6444d6e6c7552e42_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-18_d074a02dcd2329bd6444d6e6c7552e42_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-18_d074a02dcd2329bd6444d6e6c7552e42_cryptolocker.exe
-
Size
59KB
-
MD5
d074a02dcd2329bd6444d6e6c7552e42
-
SHA1
f9c49efdba51c543d7654808f07979bb18237c44
-
SHA256
485ffdee786f9d0f4aecad40639deba2d368193f9f63338f0053aa9d66d04aee
-
SHA512
70df12ac45b3f52804a1125ce0f33f084b162bbd489208f46630b2533e4099fdac55252d3c69f9ff2f39185aa4bbcca8e308caf4b52b2a8688699f8222350928
-
SSDEEP
1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EM4:TCjsIOtEvwDpj5HE/OUHnSMH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1908 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1640 2024-10-18_d074a02dcd2329bd6444d6e6c7552e42_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-18_d074a02dcd2329bd6444d6e6c7552e42_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1908 1640 2024-10-18_d074a02dcd2329bd6444d6e6c7552e42_cryptolocker.exe 30 PID 1640 wrote to memory of 1908 1640 2024-10-18_d074a02dcd2329bd6444d6e6c7552e42_cryptolocker.exe 30 PID 1640 wrote to memory of 1908 1640 2024-10-18_d074a02dcd2329bd6444d6e6c7552e42_cryptolocker.exe 30 PID 1640 wrote to memory of 1908 1640 2024-10-18_d074a02dcd2329bd6444d6e6c7552e42_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-18_d074a02dcd2329bd6444d6e6c7552e42_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-18_d074a02dcd2329bd6444d6e6c7552e42_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5f617adcd25e242fe33cbd86c57b285e9
SHA1b0bad2be8c8252c76b687f38dfd2bb555e936d47
SHA2562f6ae50e7660053493523700a9a95031014112f69fab871559bba4b2dcc01fde
SHA5128ed903eab580f77bd8a53d99f4b3d9e0c25bceecb27824d4a4db6df27353a68dfdca6c5dbb2d6b81dbb851423f4f298584d859c2bdea0f32d1307c207f22697c