Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-31_77cda428a0012b5f50aebfb8bc0fdd03_cryptolocker.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-31_77cda428a0012b5f50aebfb8bc0fdd03_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-31_77cda428a0012b5f50aebfb8bc0fdd03_cryptolocker.exe
-
Size
57KB
-
MD5
77cda428a0012b5f50aebfb8bc0fdd03
-
SHA1
2424b060c8a833c73243a4e892988288ce1d3b36
-
SHA256
06e5e14e87b203eb0f81465d16c60abd450d8eb7b244f10434a6fd9ff30484d9
-
SHA512
6e584a932b87635af98cdd220399a7abbba23d8a62a5336305fd297e9b375ff2c966d41d352d0004f114c5d332e4e8c873ca2c14c0a7795103825947bcbebf45
-
SSDEEP
768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZgBh8i6g7Goi20HA+SF:xj+VGMOtEvwDpjubEgV20gP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2904 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1056 2024-10-31_77cda428a0012b5f50aebfb8bc0fdd03_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-31_77cda428a0012b5f50aebfb8bc0fdd03_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2904 1056 2024-10-31_77cda428a0012b5f50aebfb8bc0fdd03_cryptolocker.exe 31 PID 1056 wrote to memory of 2904 1056 2024-10-31_77cda428a0012b5f50aebfb8bc0fdd03_cryptolocker.exe 31 PID 1056 wrote to memory of 2904 1056 2024-10-31_77cda428a0012b5f50aebfb8bc0fdd03_cryptolocker.exe 31 PID 1056 wrote to memory of 2904 1056 2024-10-31_77cda428a0012b5f50aebfb8bc0fdd03_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-31_77cda428a0012b5f50aebfb8bc0fdd03_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-31_77cda428a0012b5f50aebfb8bc0fdd03_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD581817a8c4cab9f498c3f2f0198fd385a
SHA17b0aa4f8b70b9d6590e410137604e770827d87b3
SHA25697d46fed586a84e18b34b57ea89fdad85f29c470ca5e70f61998a780a925c4b4
SHA5126dbeeb61b1f98f49e3ebaf8a23871051bb02aaf14e76dc9001a84631d4416b6dbfb5be222fb10d8e3df36d5dd03f08bfad63ab9c6ecfa32ffe7874aa73b468fa