Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 05:29
Behavioral task
behavioral1
Sample
2024-11-20_f286d72aa1683b93b9b63db8322d49e7_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-11-20_f286d72aa1683b93b9b63db8322d49e7_cryptolocker.exe
-
Size
72KB
-
MD5
f286d72aa1683b93b9b63db8322d49e7
-
SHA1
668cf0d911f0429514ea4adc655dd06e456c8be0
-
SHA256
1889e227c5debf955ec8354676c57f704dc630b43bd2f2019f463ca2d8abf64f
-
SHA512
fe0b0790d21fd09298d58250eab8423bfcf263b9f2cd8025625124a03ddd9b32196c976bfc6ff1d4277dda1b653ea1bb7eeaba33c5336e51165570f05f4bc3a2
-
SSDEEP
1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs97:C4Q2c94OtEvwDpj4H8zm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2348 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1680 2024-11-20_f286d72aa1683b93b9b63db8322d49e7_cryptolocker.exe -
resource yara_rule behavioral1/memory/1680-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1680-15-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2348-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x0007000000012117-16.dat upx behavioral1/memory/2348-27-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_f286d72aa1683b93b9b63db8322d49e7_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2348 1680 2024-11-20_f286d72aa1683b93b9b63db8322d49e7_cryptolocker.exe 30 PID 1680 wrote to memory of 2348 1680 2024-11-20_f286d72aa1683b93b9b63db8322d49e7_cryptolocker.exe 30 PID 1680 wrote to memory of 2348 1680 2024-11-20_f286d72aa1683b93b9b63db8322d49e7_cryptolocker.exe 30 PID 1680 wrote to memory of 2348 1680 2024-11-20_f286d72aa1683b93b9b63db8322d49e7_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_f286d72aa1683b93b9b63db8322d49e7_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-20_f286d72aa1683b93b9b63db8322d49e7_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD50197d4f04bbac9e0e9b00f334e83d3d9
SHA1cdbe62f7bbfb69035d231b0cba03f6f44b0700be
SHA2568063f26531716dd7528ef847a6f02b344201346d1f9a8afc82929f02671bb184
SHA5120b0b49480c51ecdbb50f79e11f8708b5b4ce9213a17bf97eeca7bc6a4792fe6e9fcb1e8b6e435fca2173cabcfeb0d472e16dfc96ba326ca288e3bab6032c9a86