Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 15:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-21_4a55068f7771211da0f54143efbf6652_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-12-21_4a55068f7771211da0f54143efbf6652_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-21_4a55068f7771211da0f54143efbf6652_cryptolocker.exe
-
Size
42KB
-
MD5
4a55068f7771211da0f54143efbf6652
-
SHA1
5bec973c0e3558f108d26eb94fb14fcef0a3704c
-
SHA256
d3bbe4d30e65965bf2722243b2418576764db621be07ab5cd8335c5f4766b4b9
-
SHA512
b7310b51e2f0f78837385e707603046b60f21f58bf9b16d88a540399207124ec3fa74f14da9cefdaf009b40e1ba6f6598e041673396222cfc2bb9d38fb598812
-
SSDEEP
768:bxNQIE0eBhkL2Fo1CCwgfjOg1tsJ6zeen754XcwxbFqZMP:bxNrC7kYo1Fxf3s05rwxbFh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2324 pissa.exe -
Loads dropped DLL 1 IoCs
pid Process 2480 2024-12-21_4a55068f7771211da0f54143efbf6652_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-21_4a55068f7771211da0f54143efbf6652_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pissa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2324 2480 2024-12-21_4a55068f7771211da0f54143efbf6652_cryptolocker.exe 30 PID 2480 wrote to memory of 2324 2480 2024-12-21_4a55068f7771211da0f54143efbf6652_cryptolocker.exe 30 PID 2480 wrote to memory of 2324 2480 2024-12-21_4a55068f7771211da0f54143efbf6652_cryptolocker.exe 30 PID 2480 wrote to memory of 2324 2480 2024-12-21_4a55068f7771211da0f54143efbf6652_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-21_4a55068f7771211da0f54143efbf6652_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-21_4a55068f7771211da0f54143efbf6652_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\pissa.exe"C:\Users\Admin\AppData\Local\Temp\pissa.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD54cf185a45a3fef960937a1a3e1799728
SHA1b4e77df90657a8f910a736543d7bf5f0e2ba723e
SHA2562e2a955cd639161e31e5e4e40159aa226bb70fbf065029c02ba1aad67343b55a
SHA512f4ce166cffeb02431086acb8744b2a0b71d750791cd81c60a8703afb951f5c0789961f0938f85640846ed123b5ec545751ad21f6427cf8c9aaeaf374d18675a5