Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-31_45e31ed6b98e640df386242a89a09e29_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-31_45e31ed6b98e640df386242a89a09e29_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-31_45e31ed6b98e640df386242a89a09e29_cryptolocker.exe
-
Size
47KB
-
MD5
45e31ed6b98e640df386242a89a09e29
-
SHA1
ba2b2bc1e8cfd3c710b28f2ba65265c41d316286
-
SHA256
f83c85e2fbd2039f4b365a5ca449c3b804fd427b31b3865cb89319eaa3913f20
-
SHA512
0316e8c16922f0f854db570f01271209c315953fb0ba10307ff922fb5be42456c8a825db3dec665124c2a609bf08237c7d096add85419cc40b541a6415e443c2
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/aMDhkJlN:6j+1NMOtEvwDpjrRraJP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
misid.exepid Process 2456 misid.exe -
Loads dropped DLL 1 IoCs
Processes:
2024-10-31_45e31ed6b98e640df386242a89a09e29_cryptolocker.exepid Process 2528 2024-10-31_45e31ed6b98e640df386242a89a09e29_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2024-10-31_45e31ed6b98e640df386242a89a09e29_cryptolocker.exemisid.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-31_45e31ed6b98e640df386242a89a09e29_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-10-31_45e31ed6b98e640df386242a89a09e29_cryptolocker.exedescription pid Process procid_target PID 2528 wrote to memory of 2456 2528 2024-10-31_45e31ed6b98e640df386242a89a09e29_cryptolocker.exe 30 PID 2528 wrote to memory of 2456 2528 2024-10-31_45e31ed6b98e640df386242a89a09e29_cryptolocker.exe 30 PID 2528 wrote to memory of 2456 2528 2024-10-31_45e31ed6b98e640df386242a89a09e29_cryptolocker.exe 30 PID 2528 wrote to memory of 2456 2528 2024-10-31_45e31ed6b98e640df386242a89a09e29_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-31_45e31ed6b98e640df386242a89a09e29_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-31_45e31ed6b98e640df386242a89a09e29_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5109c123d65c966b59f36795219f7cbc5
SHA1839d6679f49c580a5bace6c392160e54a3179e1b
SHA2564bde4b1f62c4bb72f1785e264813d0da6cab1ab34b69a3ec3dbf1b7fff7e7ac2
SHA512ddf891ac0d53eb34e3a9920aaca82e00ae688d21858a3505935e2063ef42dec17e98b6dd677c79cd51cb4755d955c6935d209aed34d9ac818cb0528bc76bf7fc