Analysis
-
max time kernel
12s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-11-2024 06:20
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-02_ba165cf4e4ae56fadf888d74c974a357_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-02_ba165cf4e4ae56fadf888d74c974a357_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-02_ba165cf4e4ae56fadf888d74c974a357_cryptolocker.exe
-
Size
34KB
-
MD5
ba165cf4e4ae56fadf888d74c974a357
-
SHA1
495d9b8c2cc9dec853a8ed42c94c032fb948524c
-
SHA256
65499573707cc31b51b9da2d7e6ffffc414dcbfe47a1dfc5dcdca8af8b43379f
-
SHA512
cbab8379ddb95d1bda037f2c5c447c00ebd914a873d904991d62f37d90489b0a57d80d640b307158eda129ef8867eb5190446f058f697a8bfeee8bdc28c50c8f
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznStEEr9VE/cop:b/yC4GyNM01GuQMNXw2PSjSKEBVE/cK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
retln.exepid process 2380 retln.exe -
Loads dropped DLL 1 IoCs
Processes:
2024-11-02_ba165cf4e4ae56fadf888d74c974a357_cryptolocker.exepid process 2204 2024-11-02_ba165cf4e4ae56fadf888d74c974a357_cryptolocker.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2024-11-02_ba165cf4e4ae56fadf888d74c974a357_cryptolocker.exeretln.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-02_ba165cf4e4ae56fadf888d74c974a357_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language retln.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
2024-11-02_ba165cf4e4ae56fadf888d74c974a357_cryptolocker.exeretln.exepid process 2204 2024-11-02_ba165cf4e4ae56fadf888d74c974a357_cryptolocker.exe 2380 retln.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-11-02_ba165cf4e4ae56fadf888d74c974a357_cryptolocker.exedescription pid process target process PID 2204 wrote to memory of 2380 2204 2024-11-02_ba165cf4e4ae56fadf888d74c974a357_cryptolocker.exe retln.exe PID 2204 wrote to memory of 2380 2204 2024-11-02_ba165cf4e4ae56fadf888d74c974a357_cryptolocker.exe retln.exe PID 2204 wrote to memory of 2380 2204 2024-11-02_ba165cf4e4ae56fadf888d74c974a357_cryptolocker.exe retln.exe PID 2204 wrote to memory of 2380 2204 2024-11-02_ba165cf4e4ae56fadf888d74c974a357_cryptolocker.exe retln.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-02_ba165cf4e4ae56fadf888d74c974a357_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-02_ba165cf4e4ae56fadf888d74c974a357_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD55026d24a3e74191cd0824aadd744ad25
SHA1aea8ed9e68178f3cf2993e579021752a6f358aa2
SHA2560ff1d4fea6d7db6bb06e57b232b8d49b0825f45d9971e69e802ced14498158c1
SHA512af71b894477acdaefe3514f45970a0c5133e81580dbc9ac8797a9053f1833cc36de6de4cca9c3aaf2345b6204dc8b1c8bf3b7f1d9f630e09701f55004c69d2ae