Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 06:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-21_4707ad0cbd88869e5a02d97a74ac0f2f_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-21_4707ad0cbd88869e5a02d97a74ac0f2f_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-21_4707ad0cbd88869e5a02d97a74ac0f2f_cryptolocker.exe
-
Size
31KB
-
MD5
4707ad0cbd88869e5a02d97a74ac0f2f
-
SHA1
2545a649a0e30b2e6dd5ed7e2d260e15023fa204
-
SHA256
55287a3f02112f1cacb2eba3be2c674e99782eccddc9e1b73096cb2b3db2a485
-
SHA512
bccee8314921b75fb2f782350d916527b55726f2d005de15350d95a8940c86481a66e056de674d4d6441878e6591a5d6f44850aa0c7ffa121f681fb2790f271f
-
SSDEEP
384:buWbtjL8L1iE0eBhkzPbKAaomTqC9Mwf4fjDCgpmaPc4HyVOCGHqEf:bxNQIE0eBhkL2Fo1CCwgfjOg9JyUC7M
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2820 pissa.exe -
Loads dropped DLL 1 IoCs
pid Process 2316 2024-11-21_4707ad0cbd88869e5a02d97a74ac0f2f_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_4707ad0cbd88869e5a02d97a74ac0f2f_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pissa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2820 2316 2024-11-21_4707ad0cbd88869e5a02d97a74ac0f2f_cryptolocker.exe 30 PID 2316 wrote to memory of 2820 2316 2024-11-21_4707ad0cbd88869e5a02d97a74ac0f2f_cryptolocker.exe 30 PID 2316 wrote to memory of 2820 2316 2024-11-21_4707ad0cbd88869e5a02d97a74ac0f2f_cryptolocker.exe 30 PID 2316 wrote to memory of 2820 2316 2024-11-21_4707ad0cbd88869e5a02d97a74ac0f2f_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4707ad0cbd88869e5a02d97a74ac0f2f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-21_4707ad0cbd88869e5a02d97a74ac0f2f_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\pissa.exe"C:\Users\Admin\AppData\Local\Temp\pissa.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD51e2ca0b7637d41da673e6937f9aea9c1
SHA1d6065c80b0a215cd4bbf471d46077f1b06f1f036
SHA2564a203ae56e759eaa58b45025dfa6b9952555aebe7a16a2e0a6deb20f1cde2166
SHA512cb27f98efbd2e12552b849329bd650993b07c76f0ba0cab04ca65c8300de2c9a2678b755b6d55f615519ce4facb3126d137c6a1fd8a3383df9b5a3d9b3941ee0