Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-20_e8f5739eea96477003cc3425f192356f_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-20_e8f5739eea96477003cc3425f192356f_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-20_e8f5739eea96477003cc3425f192356f_cryptolocker.exe
-
Size
62KB
-
MD5
e8f5739eea96477003cc3425f192356f
-
SHA1
93a60889c1414f70d5c8c55bf3dac4953a76eacc
-
SHA256
9ba8a1ebb454716fa5bf4e5b807e50475b84e5b914ec5900d1b34e77ba6e2a15
-
SHA512
a6b874d3aa9880eb64c30fb86f32541f2fd507b77dc63a22ee51ee086ceb64cf3f860d75ed9f628a3e70fa566f64b04e2005c5a39995dafdc2c9e018a82ba2e2
-
SSDEEP
1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMC:TCjsIOtEvwDpj5HE/OUHnSMp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2384 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2100 2024-11-20_e8f5739eea96477003cc3425f192356f_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_e8f5739eea96477003cc3425f192356f_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2384 2100 2024-11-20_e8f5739eea96477003cc3425f192356f_cryptolocker.exe 30 PID 2100 wrote to memory of 2384 2100 2024-11-20_e8f5739eea96477003cc3425f192356f_cryptolocker.exe 30 PID 2100 wrote to memory of 2384 2100 2024-11-20_e8f5739eea96477003cc3425f192356f_cryptolocker.exe 30 PID 2100 wrote to memory of 2384 2100 2024-11-20_e8f5739eea96477003cc3425f192356f_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_e8f5739eea96477003cc3425f192356f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-20_e8f5739eea96477003cc3425f192356f_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5edb7392d96b9712944bfa366bbeef4c8
SHA1befb03b11e1bbcfe846d0e7215ac3eab4a97c443
SHA256e5f2e74cb0cce112a2a2b42dcc925aecec4c44d0891daa54f248c37e13315c4b
SHA51286933b0a4de0286291b5edeafcc295408a47c5de208b7ab3ceec46c1730cc7da85868151d166df9f4e9cb5a8a326425c31bc51c082fb102ec62f052fb2efccb9