Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:11
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-31_edebc0db3161b6115224d14e797aa997_cryptolocker.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-31_edebc0db3161b6115224d14e797aa997_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-31_edebc0db3161b6115224d14e797aa997_cryptolocker.exe
-
Size
44KB
-
MD5
edebc0db3161b6115224d14e797aa997
-
SHA1
caec69750a8ec3b2028812179251b69757b1ec48
-
SHA256
a863c7118698e7236ea8a23c245b946885b6a90fe8987c9d8ee92d53e8d14589
-
SHA512
4f53ace6b755d5bbc0b52528b7b5f0b9b9e4125ccd4880e4d7a76b6a523246b371ddd4ab2d8cd6600fecb20a90b354465b994f938470e6fc21df34f2c6d835fa
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjZ1UKXJ0ToBpd:ZzFbxmLPWQMOtEvwDpjbtJ0gj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2896 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2956 2024-10-31_edebc0db3161b6115224d14e797aa997_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-31_edebc0db3161b6115224d14e797aa997_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2896 2956 2024-10-31_edebc0db3161b6115224d14e797aa997_cryptolocker.exe 31 PID 2956 wrote to memory of 2896 2956 2024-10-31_edebc0db3161b6115224d14e797aa997_cryptolocker.exe 31 PID 2956 wrote to memory of 2896 2956 2024-10-31_edebc0db3161b6115224d14e797aa997_cryptolocker.exe 31 PID 2956 wrote to memory of 2896 2956 2024-10-31_edebc0db3161b6115224d14e797aa997_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-31_edebc0db3161b6115224d14e797aa997_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-31_edebc0db3161b6115224d14e797aa997_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5eab38fdc05476ec5233419392849d00a
SHA1aed0f45f397eb5b73d1fdb2ad38874397d2ab41e
SHA256f3d9ea66303cab12f5a145184eac318f960905239e8d1429c7018fc96695ed93
SHA512e6d59cdfe337d3a55f5eeacc1de8894b9d3a22bf0cdece632df72c3af0f624d8dcac1504f121207c8040284209ee9aa2935d37c8962ba228088d22a04b2ceedf