Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 06:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-21_336bdabcf2ce2746704202bfb7668cf1_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-21_336bdabcf2ce2746704202bfb7668cf1_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-21_336bdabcf2ce2746704202bfb7668cf1_cryptolocker.exe
-
Size
50KB
-
MD5
336bdabcf2ce2746704202bfb7668cf1
-
SHA1
39378d483a5ec4bfd6a330aa051711b961cf6e0d
-
SHA256
8ad0af42d8363274a3c1a90f139e376b53b848cc9e2034d6eff418c5b9a83185
-
SHA512
26561d61526708c290d668b6cc470ced9b39a0013430acab5cc902340298c56be7acd26521dca6ef54fd9f482b8c0655f11cdbcbc2459d3fe420b5ea4a896b78
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4/Uth8igNrr42A7n0FmB0n7Y:vj+jsMQMOtEvwDpj5HczerLO04BH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1864 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2568 2024-11-21_336bdabcf2ce2746704202bfb7668cf1_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_336bdabcf2ce2746704202bfb7668cf1_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2568 wrote to memory of 1864 2568 2024-11-21_336bdabcf2ce2746704202bfb7668cf1_cryptolocker.exe 30 PID 2568 wrote to memory of 1864 2568 2024-11-21_336bdabcf2ce2746704202bfb7668cf1_cryptolocker.exe 30 PID 2568 wrote to memory of 1864 2568 2024-11-21_336bdabcf2ce2746704202bfb7668cf1_cryptolocker.exe 30 PID 2568 wrote to memory of 1864 2568 2024-11-21_336bdabcf2ce2746704202bfb7668cf1_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_336bdabcf2ce2746704202bfb7668cf1_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-21_336bdabcf2ce2746704202bfb7668cf1_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5aa0c7b4b42d252d30bf09c854ed1f37d
SHA1869c5231fe3e46afedd34815ff5812844999fe4f
SHA256f65d9baa3256f069f34f0245c19c28e51c25aef1119dc70a424a05f1a083d2c5
SHA51230fa0179495d5abc5eb2d83ce2c6eb883d8e1acb6c2f32a6d43fa43746d8790db256d8448a3de9fa0f90e4490fc440fa043b31b41ebfe1852820235a7eda273d