Analysis
-
max time kernel
132s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 06:50
Behavioral task
behavioral1
Sample
2024-11-21_725f062c2c078a9ddcd0fb6c8f647ff9_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-11-21_725f062c2c078a9ddcd0fb6c8f647ff9_cryptolocker.exe
-
Size
60KB
-
MD5
725f062c2c078a9ddcd0fb6c8f647ff9
-
SHA1
f73910edb3d0240e39d6ad6521330b46c43133db
-
SHA256
436976ebe82df6c2d3563ad8e68b60f3d755d58681bfd37c7382ce0aa513ef0b
-
SHA512
5ac700dec37dfb57f2c0728761057e4db47aa4355f7d939e0e02ab530614458bb02ad1188491ad17fd2707092fe12b10cfdf8b6450e862022bd483fdf9b65f48
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUFH4:T6a+rdOOtEvwDpjN+Y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1780 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1712 2024-11-21_725f062c2c078a9ddcd0fb6c8f647ff9_cryptolocker.exe -
resource yara_rule behavioral1/memory/1712-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000b00000001225a-11.dat upx behavioral1/memory/1712-14-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1780-25-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_725f062c2c078a9ddcd0fb6c8f647ff9_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1780 1712 2024-11-21_725f062c2c078a9ddcd0fb6c8f647ff9_cryptolocker.exe 30 PID 1712 wrote to memory of 1780 1712 2024-11-21_725f062c2c078a9ddcd0fb6c8f647ff9_cryptolocker.exe 30 PID 1712 wrote to memory of 1780 1712 2024-11-21_725f062c2c078a9ddcd0fb6c8f647ff9_cryptolocker.exe 30 PID 1712 wrote to memory of 1780 1712 2024-11-21_725f062c2c078a9ddcd0fb6c8f647ff9_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_725f062c2c078a9ddcd0fb6c8f647ff9_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-21_725f062c2c078a9ddcd0fb6c8f647ff9_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5c843befd6e9de49512c77a35158cf6f1
SHA170c176a6d8fcf095a42beb9fe00cb0e19b92ba3b
SHA256dce3b4212d804dc47ca587d6f36889ef30288f89df2b4c2258509e7f54942101
SHA5129821f213a1fab5be1c9795de252137ea7371410457f888f2899ec82e27b3f3c0c5162cc51fa94482202b387e343de21059d927edeec7efa5585d492a153f6fcb