Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-31_740e6a2bf31fb9fe9cca1e12973c8b31_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-31_740e6a2bf31fb9fe9cca1e12973c8b31_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-31_740e6a2bf31fb9fe9cca1e12973c8b31_cryptolocker.exe
-
Size
87KB
-
MD5
740e6a2bf31fb9fe9cca1e12973c8b31
-
SHA1
602f040fa1822387789c4f60fb46d974e3e87d05
-
SHA256
340c5e099bdaeb4d5a1b2492008484f93cb4bdec10d3337fc8585f7ca41b101d
-
SHA512
7e495f19085b9b8f74aa0aed832078a42ccdd85b4edff361a76e60b3dae11f0b373652cb8078ed17571e7022d53123a8b334d2f1eba5afabff1689e65e6e25a6
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjyaLccVNl6ageD:V6a+pOtEvwDpjvpP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2816 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2300 2024-10-31_740e6a2bf31fb9fe9cca1e12973c8b31_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-31_740e6a2bf31fb9fe9cca1e12973c8b31_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2816 2300 2024-10-31_740e6a2bf31fb9fe9cca1e12973c8b31_cryptolocker.exe 30 PID 2300 wrote to memory of 2816 2300 2024-10-31_740e6a2bf31fb9fe9cca1e12973c8b31_cryptolocker.exe 30 PID 2300 wrote to memory of 2816 2300 2024-10-31_740e6a2bf31fb9fe9cca1e12973c8b31_cryptolocker.exe 30 PID 2300 wrote to memory of 2816 2300 2024-10-31_740e6a2bf31fb9fe9cca1e12973c8b31_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-31_740e6a2bf31fb9fe9cca1e12973c8b31_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-31_740e6a2bf31fb9fe9cca1e12973c8b31_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5fdc22b028e15af8f57ddf0d7e1748638
SHA179601352e22781101fd3aa38cd0f66b234ad204e
SHA256b4134a166e1fd30892d31c050b5ceebb606020d2cca325d2cde60e73dee7716a
SHA512c50870ba6d996cb4ba8c14c9c916479ac12629aac9c81449cd487b328a51f33aab216db1f9a498161d92fcbc5e833f1b356251ea454bee85954ab74f5cfbb1b1