Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 07:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-21_2127291ff893f9572a3eda33ed9fcba2_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-21_2127291ff893f9572a3eda33ed9fcba2_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-21_2127291ff893f9572a3eda33ed9fcba2_cryptolocker.exe
-
Size
75KB
-
MD5
2127291ff893f9572a3eda33ed9fcba2
-
SHA1
8978c18c9230e700f9ae7177d9eb48fed22fa7e7
-
SHA256
6d0550f22fb4b3ba123527922a8caca73b78a7ec0c6b668144fbf14787526f99
-
SHA512
c7fe9a1ed419a7f3531e3c892cd37d28c90ae3e3902e8b8bc51232be0287bb5f1514e8aef574c0f8013b3fa0f482ff42b816945b66cd46a2bf34feaf275f2691
-
SSDEEP
768:9UQz7yVEhs9+4T/1bytOOtEvwDpjLXOQ69zbjlAAX5e9zMy:9Uj+AIMOtEvwDpjLizbR9XwzP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2160 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2672 2024-11-21_2127291ff893f9572a3eda33ed9fcba2_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_2127291ff893f9572a3eda33ed9fcba2_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2160 2672 2024-11-21_2127291ff893f9572a3eda33ed9fcba2_cryptolocker.exe 31 PID 2672 wrote to memory of 2160 2672 2024-11-21_2127291ff893f9572a3eda33ed9fcba2_cryptolocker.exe 31 PID 2672 wrote to memory of 2160 2672 2024-11-21_2127291ff893f9572a3eda33ed9fcba2_cryptolocker.exe 31 PID 2672 wrote to memory of 2160 2672 2024-11-21_2127291ff893f9572a3eda33ed9fcba2_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_2127291ff893f9572a3eda33ed9fcba2_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-21_2127291ff893f9572a3eda33ed9fcba2_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD5bc02c83e3440d7abe276e65f231eb09b
SHA12c5edb9c72a6e6acabd15f701f717be8dfedcee6
SHA2563af3a92b4d96a89800dfaf476333822a4e74f86005e310db697d8aa8a25c9529
SHA512e82d5497bf2e636baa416b2ebf49ee62079724ccf829bbe077942bd03a9e7f9e1f19ab00e334c3dafc4af8bb81fb2040e32699fb5a7690c08ff17082eae5241f