Analysis
-
max time kernel
132s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:33
Behavioral task
behavioral1
Sample
2024-11-20_a172c49903b3f8917297d7e8812d354c_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-11-20_a172c49903b3f8917297d7e8812d354c_cryptolocker.exe
-
Size
55KB
-
MD5
a172c49903b3f8917297d7e8812d354c
-
SHA1
a84cd58a216fde68ed17046bcabb9b029d91c037
-
SHA256
238ef626b1ae6f1721c5bf7ca30a7dfecc694299f0463704959ac86475510786
-
SHA512
89b8ca53c9b261897fff06ad8267bb9458b8b0d408c2588ef98756c12f30870b97a4217839c1a45e8011403ffdabccd14f3e3f63f770a6e395f9405580e6c6ab
-
SSDEEP
768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOkgYC:z6QFElP6n+gKmddpMOtEvwDpj31ikgZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3032 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2532 2024-11-20_a172c49903b3f8917297d7e8812d354c_cryptolocker.exe -
resource yara_rule behavioral1/memory/2532-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x0007000000012117-11.dat upx behavioral1/memory/2532-15-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/3032-25-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_a172c49903b3f8917297d7e8812d354c_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 3032 2532 2024-11-20_a172c49903b3f8917297d7e8812d354c_cryptolocker.exe 30 PID 2532 wrote to memory of 3032 2532 2024-11-20_a172c49903b3f8917297d7e8812d354c_cryptolocker.exe 30 PID 2532 wrote to memory of 3032 2532 2024-11-20_a172c49903b3f8917297d7e8812d354c_cryptolocker.exe 30 PID 2532 wrote to memory of 3032 2532 2024-11-20_a172c49903b3f8917297d7e8812d354c_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_a172c49903b3f8917297d7e8812d354c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-20_a172c49903b3f8917297d7e8812d354c_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5d827b0573ee768aea354a9aeea4a27fc
SHA1eb8426ec95140e2f60f15e94aaab969129f2c591
SHA2567aa298107264dc29ffe855495fb9c454b3fe8637432d708cdb1aece681a90d46
SHA5127c7b94ae9591cf8befd8a91b73237bcce8fe7987a0e847b0080c7a3d60cb3afdef80b5a113f08ea5c6141648ee6d5034132035a012e4750d51e797a36acd98ae