Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-20_493777fa638cca6476609936240f6e25_cryptolocker.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-11-20_493777fa638cca6476609936240f6e25_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-20_493777fa638cca6476609936240f6e25_cryptolocker.exe
-
Size
53KB
-
MD5
493777fa638cca6476609936240f6e25
-
SHA1
969181eb9552a3f6627f3bc0cb0a6d1fc010e8e4
-
SHA256
eaa486518cc428c06f26a73af2825c7914caab65ea8a96bef91b0caf17ac0817
-
SHA512
89a5633b246a85e4d2665fe9ea2f383e6e1dedbae9bf4810e4e07943e1110fa0201689040f0e50a12747816ba1d734cf9aab8647807bfbfb8579400946bb9061
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4hdCW1nw71TkhsiPn1YFvPR:vj+jsMQMOtEvwDpj5HH1nw73KOFR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1456 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2116 2024-11-20_493777fa638cca6476609936240f6e25_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_493777fa638cca6476609936240f6e25_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 1456 2116 2024-11-20_493777fa638cca6476609936240f6e25_cryptolocker.exe 30 PID 2116 wrote to memory of 1456 2116 2024-11-20_493777fa638cca6476609936240f6e25_cryptolocker.exe 30 PID 2116 wrote to memory of 1456 2116 2024-11-20_493777fa638cca6476609936240f6e25_cryptolocker.exe 30 PID 2116 wrote to memory of 1456 2116 2024-11-20_493777fa638cca6476609936240f6e25_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_493777fa638cca6476609936240f6e25_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-20_493777fa638cca6476609936240f6e25_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD55e0a0ba78a787fc2ce99a17d6e1f7525
SHA1f2e7b806835e673f03036de03464b4ec2996cecf
SHA256ea62981ec75b0f27fd427d573caa05378226ff676c5fc34cb83899aa5a3cf115
SHA51254d232de47cb82ee6eb3875c88b0145b83a9d4d6ede0eb0d82e147c89ba1a1059dc56b16557c54cdd39b7a4a153da3efa1ddda237ca8473ca2c2563e66b5a795