Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 04:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-20_f558a7b246ae08c7c4c4f063521f051c_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-20_f558a7b246ae08c7c4c4f063521f051c_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-20_f558a7b246ae08c7c4c4f063521f051c_cryptolocker.exe
-
Size
73KB
-
MD5
f558a7b246ae08c7c4c4f063521f051c
-
SHA1
011d591fc86d4271e9a7c0cf663fc61dba954dbd
-
SHA256
a5cf74367ab5b67eef5aa5240413b7a4755e2f35e3adfeb54c0db99cb657a9e3
-
SHA512
381e351b6b0fbdb5773fef0a379f7fae9db071887a165608cfb96729fcb41f55d75116468f8519f2a42eaba079db6e7761a14164dcd41bf03648d150588d3cda
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4ZPsED3VK2+ZtyOjgO4r9vFAg2rq2g1B/Rr:vj+jsMQMOtEvwDpj5HZYTjipvF24D
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2676 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2692 2024-11-20_f558a7b246ae08c7c4c4f063521f051c_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_f558a7b246ae08c7c4c4f063521f051c_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2676 2692 2024-11-20_f558a7b246ae08c7c4c4f063521f051c_cryptolocker.exe 31 PID 2692 wrote to memory of 2676 2692 2024-11-20_f558a7b246ae08c7c4c4f063521f051c_cryptolocker.exe 31 PID 2692 wrote to memory of 2676 2692 2024-11-20_f558a7b246ae08c7c4c4f063521f051c_cryptolocker.exe 31 PID 2692 wrote to memory of 2676 2692 2024-11-20_f558a7b246ae08c7c4c4f063521f051c_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_f558a7b246ae08c7c4c4f063521f051c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-20_f558a7b246ae08c7c4c4f063521f051c_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5f945a618eb188c7c245195519935ebf1
SHA18b3a65a2d64c1d4f78f937e2ae88ee842ed31d88
SHA2562463adb04b74fd86b1c650c2343ce6f2013de2c79841f3de24b4e6cd2f6f1b06
SHA512877226f1f14f342bac3a970db7c9bcf825b05d67213f14b01ac3f01b6dc388705c28daf2bfcb94149657f0e30bea28a39ef3b36ed52f9feb8e2881a2d7cb8a1a