Analysis
-
max time kernel
132s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/03/2025, 08:05
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-21_05bba76e4016e739e90adc510f56cfee_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-21_05bba76e4016e739e90adc510f56cfee_cryptolocker.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-21_05bba76e4016e739e90adc510f56cfee_cryptolocker.exe
-
Size
81KB
-
MD5
05bba76e4016e739e90adc510f56cfee
-
SHA1
e085e4df26c00cd4cdbb53e3a4860bb63c4daac9
-
SHA256
b55cad056ff5b16e209503b71d83d9fb52b3ac8496ec5296ea80b01dccd31c15
-
SHA512
270cb0fa101eae6c3860da7c32c06470ca068e5f95f3d6567a99aaa7760160f049d0603d14300c078fe6e90959bd8f071e45269703c1853f98c75e17dfb003d0
-
SSDEEP
1536:bG/y2lmBnzzLx0F0+B2taDfNjHft0HJd1iJ:bGarBnzzLxLt6VjHf2HJd1+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2588 rewok.exe -
Loads dropped DLL 1 IoCs
pid Process 2360 2025-03-21_05bba76e4016e739e90adc510f56cfee_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rewok.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-21_05bba76e4016e739e90adc510f56cfee_cryptolocker.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2360 2025-03-21_05bba76e4016e739e90adc510f56cfee_cryptolocker.exe 2588 rewok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2588 2360 2025-03-21_05bba76e4016e739e90adc510f56cfee_cryptolocker.exe 30 PID 2360 wrote to memory of 2588 2360 2025-03-21_05bba76e4016e739e90adc510f56cfee_cryptolocker.exe 30 PID 2360 wrote to memory of 2588 2360 2025-03-21_05bba76e4016e739e90adc510f56cfee_cryptolocker.exe 30 PID 2360 wrote to memory of 2588 2360 2025-03-21_05bba76e4016e739e90adc510f56cfee_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-21_05bba76e4016e739e90adc510f56cfee_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-21_05bba76e4016e739e90adc510f56cfee_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5eb3a8bb1a06be1d975039d9afb0f3bb1
SHA17bc36cde2935e450596ba7a6ba6480f37fa7e28b
SHA25624a0e59a9931c2409ea2559cc4f8cf839760f5d79c07fdf9993e454d4f899570
SHA512d34f6a8f78a3e82f4c3ac83578b8fa8329af0181d6db580ae3ad5cce81fea5a78027be078a621d9317a98eb4c6420b976539117284c9d6e95d5de6f462469076