Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 04:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-21_994f586abeaa92f2e47dac1e4ff2a4b8_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-21_994f586abeaa92f2e47dac1e4ff2a4b8_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-21_994f586abeaa92f2e47dac1e4ff2a4b8_cryptolocker.exe
-
Size
70KB
-
MD5
994f586abeaa92f2e47dac1e4ff2a4b8
-
SHA1
3873f5a810ac632aa42cd16bdcf49d181de84b23
-
SHA256
da517859f85be2e645066492ada34b832db15fa9aca1fe00c571955e6c6e9a68
-
SHA512
03350a1ff2ff2acb94b53349d0ef11ef43648e356c880732d04cac83f90b9323e80d1e417a60b629198c0437060305273ceb26c5f283a97a20b2ec8294cdd2fc
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5I52kGEpE0P/xFI0tSbW:6j+1NMOtEvwDpjr8ox8UDEpN/jhOW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2188 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1688 2024-11-21_994f586abeaa92f2e47dac1e4ff2a4b8_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_994f586abeaa92f2e47dac1e4ff2a4b8_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2188 1688 2024-11-21_994f586abeaa92f2e47dac1e4ff2a4b8_cryptolocker.exe 28 PID 1688 wrote to memory of 2188 1688 2024-11-21_994f586abeaa92f2e47dac1e4ff2a4b8_cryptolocker.exe 28 PID 1688 wrote to memory of 2188 1688 2024-11-21_994f586abeaa92f2e47dac1e4ff2a4b8_cryptolocker.exe 28 PID 1688 wrote to memory of 2188 1688 2024-11-21_994f586abeaa92f2e47dac1e4ff2a4b8_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_994f586abeaa92f2e47dac1e4ff2a4b8_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-21_994f586abeaa92f2e47dac1e4ff2a4b8_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5fe81bf980ead9b980d4cd90a216425a3
SHA1ad9864cc9d9cd84acd18ef64292e2ec05ef47009
SHA256259923c16fc2564a295a17d831113688b21a9667779f6926e2e431b3418a2d35
SHA512db4835cce53aeba5923da43f4ca67707fb139d098e21d8d9e213430e078ed66e158d80739076eeece3bbb38066e2a04d217c834c98afc80bedba8d8cf0f8ddd3