Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-21_43bc7beaba63d32aa29df28b3d680570_cryptolocker.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-11-21_43bc7beaba63d32aa29df28b3d680570_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-21_43bc7beaba63d32aa29df28b3d680570_cryptolocker.exe
-
Size
37KB
-
MD5
43bc7beaba63d32aa29df28b3d680570
-
SHA1
dd1c0b6fa46d86620558fe26660336ad167e1be3
-
SHA256
af43e2b2493cb9c95c10f9962a8643df313420df268b76021e2c5d6906daf0c6
-
SHA512
5025ffb88ce2f113141a4c5f4f9021fe963be4c64da4d454661f2271338f28ac4e7ffd21b2314ce15e93ce518d42eeded0e07a0f141fee193bd27ce84ff0791c
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVajSKm5uzq+n40:X6QFElP6n+gJQMOtEvwDpjBcSKm5uOu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3020 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2152 2024-11-21_43bc7beaba63d32aa29df28b3d680570_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_43bc7beaba63d32aa29df28b3d680570_cryptolocker.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 3020 2152 2024-11-21_43bc7beaba63d32aa29df28b3d680570_cryptolocker.exe 30 PID 2152 wrote to memory of 3020 2152 2024-11-21_43bc7beaba63d32aa29df28b3d680570_cryptolocker.exe 30 PID 2152 wrote to memory of 3020 2152 2024-11-21_43bc7beaba63d32aa29df28b3d680570_cryptolocker.exe 30 PID 2152 wrote to memory of 3020 2152 2024-11-21_43bc7beaba63d32aa29df28b3d680570_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_43bc7beaba63d32aa29df28b3d680570_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-21_43bc7beaba63d32aa29df28b3d680570_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD531f5207470f49b4fac140b6c23c56949
SHA1e4f5f07a307d5bc1201d36dce20aeee10a220a24
SHA256367538b8c456830f64e1346b5f1a61c123f06ccc84ade2ebe9a017352eb7e1c6
SHA512352dd15e19768bc92095f533ae4319d07b4f8d4ae20e3b9d96db5109b138e3870e0241ac17dad4ee194ef092b964cb3b2105dae42a564c097ca63eb20ae494e5