Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 04:10
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-21_cc17ca74a22ace45b489a29602b6d694_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-21_cc17ca74a22ace45b489a29602b6d694_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-21_cc17ca74a22ace45b489a29602b6d694_cryptolocker.exe
-
Size
29KB
-
MD5
cc17ca74a22ace45b489a29602b6d694
-
SHA1
69b2ea40a1d62e5eeef3ae2d071e85b1e5315615
-
SHA256
a486d49a57eb80fdd50fb005a45668a18e2dcb0c99bc5acab4044c33c306be55
-
SHA512
8fbfd15ee48ae4d318fc31ca4f730bbeb55ef78d24610378d589ec8604ca8f2a625880261a88138a400731587563b426143f775c9bcc6c34b3258774fbf6f855
-
SSDEEP
384:v0VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26Rsn1rCcOQtOOtEvwDpjqIGRS/Vb9hk:vQz7yVEhs9+js1SQtOOtEvwDpjz9+qK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2984 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 684 2024-11-21_cc17ca74a22ace45b489a29602b6d694_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_cc17ca74a22ace45b489a29602b6d694_cryptolocker.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 684 wrote to memory of 2984 684 2024-11-21_cc17ca74a22ace45b489a29602b6d694_cryptolocker.exe 30 PID 684 wrote to memory of 2984 684 2024-11-21_cc17ca74a22ace45b489a29602b6d694_cryptolocker.exe 30 PID 684 wrote to memory of 2984 684 2024-11-21_cc17ca74a22ace45b489a29602b6d694_cryptolocker.exe 30 PID 684 wrote to memory of 2984 684 2024-11-21_cc17ca74a22ace45b489a29602b6d694_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_cc17ca74a22ace45b489a29602b6d694_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-21_cc17ca74a22ace45b489a29602b6d694_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD596450c635a9a41e91c7c538a33995a0a
SHA1e20f283028d661b47780e2987663a4f25957be8e
SHA256a0b720e65e508240229245b19b3ba292b44785b9d9f891cdb97e4b76a359f765
SHA512bceeec58d842e58f99c7cfcbf6e289798e7a92b1a6d546de59a9f00c7007791c2f006a1291e5c9842bfa4d467602a16a7b8c2ad7cbbe2f4d77ed35689c8d0064