Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 02:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-20_a3f2a109d9059ce0a1999cbf2433fa6d_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-20_a3f2a109d9059ce0a1999cbf2433fa6d_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-20_a3f2a109d9059ce0a1999cbf2433fa6d_cryptolocker.exe
-
Size
25KB
-
MD5
a3f2a109d9059ce0a1999cbf2433fa6d
-
SHA1
258a94602ce9a53ecc2a155f6cf7b66119465614
-
SHA256
578fa50d9047d49373a3c0041a8e2e32ebc864359dd1407abcb34b5f7fea5c7f
-
SHA512
5f5862ee157b2b1f73c5b07f29c67af8ee345ca02da41211eaf302cc23b524e6d362fe540636fa937c2a7bcfb02a48408db33f30593129162585a5b8944f191c
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/P4QtOOtEvwDpjV:ZzFbxmLP4QMOtEvwDpjV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2400 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2100 2024-11-20_a3f2a109d9059ce0a1999cbf2433fa6d_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_a3f2a109d9059ce0a1999cbf2433fa6d_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2400 2100 2024-11-20_a3f2a109d9059ce0a1999cbf2433fa6d_cryptolocker.exe 31 PID 2100 wrote to memory of 2400 2100 2024-11-20_a3f2a109d9059ce0a1999cbf2433fa6d_cryptolocker.exe 31 PID 2100 wrote to memory of 2400 2100 2024-11-20_a3f2a109d9059ce0a1999cbf2433fa6d_cryptolocker.exe 31 PID 2100 wrote to memory of 2400 2100 2024-11-20_a3f2a109d9059ce0a1999cbf2433fa6d_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_a3f2a109d9059ce0a1999cbf2433fa6d_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-20_a3f2a109d9059ce0a1999cbf2433fa6d_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD556e770fe9aba3daefa34a059090f5463
SHA1cfeaf299b0f8b8ac04743caf256850c7be35697b
SHA2562fe59ca2a1229d9acbba4b3bc1755413034eb6976f2047cc7884e9e94fecf1a1
SHA5120e3ca48177dd5558cf81d22062f9b965718c9b37a92e90a2c4fa2d9217d67d521509670429e807a5b529e26aa3ecff6901edcaf6274d22c2f831cd50aae1a7a9