Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 05:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-20_fcb268ae9020f771175891766830a4c6_cryptolocker.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-11-20_fcb268ae9020f771175891766830a4c6_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-20_fcb268ae9020f771175891766830a4c6_cryptolocker.exe
-
Size
45KB
-
MD5
fcb268ae9020f771175891766830a4c6
-
SHA1
567788592d7eedf49e9f2a2c7b0a579473160786
-
SHA256
843b4b5534015ab1154a1ba84431f60c065db61aa800d0ba67524f745cdf2681
-
SHA512
26a8fabab52b3d3d28d26a7c89a0801a427ebffcf22b76cc4c8bb687fb5c182ff11050984347d248f5c8d6ddbc19c450f49461374f7928f589525fd8b2dd7c3d
-
SSDEEP
768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAqjrh:bCDOw9aMDooc+vAqj9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1968 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 1728 2024-11-20_fcb268ae9020f771175891766830a4c6_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_fcb268ae9020f771175891766830a4c6_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lossy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1968 1728 2024-11-20_fcb268ae9020f771175891766830a4c6_cryptolocker.exe 31 PID 1728 wrote to memory of 1968 1728 2024-11-20_fcb268ae9020f771175891766830a4c6_cryptolocker.exe 31 PID 1728 wrote to memory of 1968 1728 2024-11-20_fcb268ae9020f771175891766830a4c6_cryptolocker.exe 31 PID 1728 wrote to memory of 1968 1728 2024-11-20_fcb268ae9020f771175891766830a4c6_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_fcb268ae9020f771175891766830a4c6_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-20_fcb268ae9020f771175891766830a4c6_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5dbcda13d263bed364e7cfe3cfb09e16a
SHA149fa3bb9a2e9ea94d0ce9aadf932b34b6dc52d4e
SHA2563ac1ac27d3a82d6ba230324406bfa23b0d69ddf8562a2a7a2b87d52ea5975032
SHA5129dce084dbf21fe4f5c4cb963c83cf86f65fcb2daeace68090a5e6155ae337e2e25000d9b6ba53d803c15f41c9bf73b49ace4437bbff15d23e66db78d3656f9f1