Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 05:27
Behavioral task
behavioral1
Sample
2024-11-20_c41ad1433ad571d623bea1bed5ef839c_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-11-20_c41ad1433ad571d623bea1bed5ef839c_cryptolocker.exe
-
Size
86KB
-
MD5
c41ad1433ad571d623bea1bed5ef839c
-
SHA1
61315ab7bf27b4e14312a5d485ab544eeb7ad802
-
SHA256
01f049b169707dda1f4b8bb69d81cdb2b1c2370c115d8560b94224106d68ddf3
-
SHA512
86bd1529c91bbc411ff12f252b49e6d7a405fed0161f9e9c340aa9e167fb89652c4302722e6926e9dbb826caf475685b70ecb83348b6ac41130c8a0923d032c8
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalB93:1nK6a+qdOOtEvwDpju
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1536 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 3016 2024-11-20_c41ad1433ad571d623bea1bed5ef839c_cryptolocker.exe -
resource yara_rule behavioral1/memory/3016-0-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x000a00000001225d-11.dat upx behavioral1/memory/1536-17-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/memory/3016-15-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/memory/1536-27-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_c41ad1433ad571d623bea1bed5ef839c_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 1536 3016 2024-11-20_c41ad1433ad571d623bea1bed5ef839c_cryptolocker.exe 30 PID 3016 wrote to memory of 1536 3016 2024-11-20_c41ad1433ad571d623bea1bed5ef839c_cryptolocker.exe 30 PID 3016 wrote to memory of 1536 3016 2024-11-20_c41ad1433ad571d623bea1bed5ef839c_cryptolocker.exe 30 PID 3016 wrote to memory of 1536 3016 2024-11-20_c41ad1433ad571d623bea1bed5ef839c_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_c41ad1433ad571d623bea1bed5ef839c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-20_c41ad1433ad571d623bea1bed5ef839c_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD53cce47af569fe035e92692238cf68627
SHA1d50bc47a7f04f4512aa8ff15076804c5c48a9004
SHA2567fe7b03354790ee0fa63407e70fab1b472f2eecef3b6e830530b196e8cb8ddd3
SHA5125ba62581ab7fa3e40a776e06150f0859102c2f39e58fe2301e4197d1d7a8424f3d67774122bd3e6ca88c21b0ab4cc021d1948c6ba086d13100b1e7a416b4a4d8