Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-20_5fceda639faf6762900ab9289f023282_cryptolocker.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2024-11-20_5fceda639faf6762900ab9289f023282_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-20_5fceda639faf6762900ab9289f023282_cryptolocker.exe
-
Size
61KB
-
MD5
5fceda639faf6762900ab9289f023282
-
SHA1
907ad048aaa19e48d7cc2699dd8e451f0d8c3dd7
-
SHA256
2fe4d5abc14de360d2759070ac08bcea92dd2a40a94be0d81c3a7322f2e6bd26
-
SHA512
c61ad2de87e44033c487d84a98b1ff71fe58fb3d8ca1be4e0adc70f1b8ab2d7571f757db2b22b24d2b7c336be69bfc14aa57c02d7f08034c6950a81e3c3e7b06
-
SSDEEP
1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMV:TCjsIOtEvwDpj5HE/OUHnSMO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3028 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2172 2024-11-20_5fceda639faf6762900ab9289f023282_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_5fceda639faf6762900ab9289f023282_cryptolocker.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 3028 2172 2024-11-20_5fceda639faf6762900ab9289f023282_cryptolocker.exe 30 PID 2172 wrote to memory of 3028 2172 2024-11-20_5fceda639faf6762900ab9289f023282_cryptolocker.exe 30 PID 2172 wrote to memory of 3028 2172 2024-11-20_5fceda639faf6762900ab9289f023282_cryptolocker.exe 30 PID 2172 wrote to memory of 3028 2172 2024-11-20_5fceda639faf6762900ab9289f023282_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_5fceda639faf6762900ab9289f023282_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-20_5fceda639faf6762900ab9289f023282_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5483aada0d5e02a1fe907032e12027fa7
SHA189cf8a159ca76c0f2d997cbafbdcc0ceaa012ffb
SHA2563a253131629e3e5db60f76e98db7419bab508c1e7ba33d77c787a955bd50eba7
SHA512c5642a5dac34e8675532c98d7ab69cdfc874cf4098a8bd1e8b593d26eb898ed4ce6749a7c5611de2e680f4b78d81ac2c000f49ceb925029d1cabb48c0f18c7f4