Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2025, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
0be1f445537f124b5175e1f2d1da87e2e57aa4ba09ea5fe72b7bafaf0b8f9ad2.exe
Resource
win10v2004-20250314-en
General
-
Target
0be1f445537f124b5175e1f2d1da87e2e57aa4ba09ea5fe72b7bafaf0b8f9ad2.exe
-
Size
696KB
-
MD5
b17603f401719f1d99ad6472f8d6682a
-
SHA1
7bb8e39ac06ff30a7f950915eede119355f15a27
-
SHA256
0be1f445537f124b5175e1f2d1da87e2e57aa4ba09ea5fe72b7bafaf0b8f9ad2
-
SHA512
893465bd19cba61c8dfc4bc3a455f84bf93fc2ce67ca55493a1385a649e2996a66f45fa337ce02b623b3eaf4f9d0fe233cee22c313452128db0ca2f99182fab5
-
SSDEEP
12288:g8dz7bg6rRFD7pf4bvgMwqXkHW94XQ/DQ6F1PiJrINa1xuGBmGGcQvSCtCWXou2l:guz3g6rRFDtf4b4MxXkHI4XQ/DQ6FFi7
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Cryptolocker family
-
Deletes itself 1 IoCs
pid Process 2120 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Executes dropped EXE 3 IoCs
pid Process 2120 {34184A33-0407-212E-3320-09040709E2C2}.exe 3680 {34184A33-0407-212E-3320-09040709E2C2}.exe 4224 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34184A33-0407-212E-3320-09040709E2C2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34184A33-0407-212E-3320-09040709E2C2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34184A33-0407-212E-3320-09040709E2C2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0be1f445537f124b5175e1f2d1da87e2e57aa4ba09ea5fe72b7bafaf0b8f9ad2.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2120 1860 0be1f445537f124b5175e1f2d1da87e2e57aa4ba09ea5fe72b7bafaf0b8f9ad2.exe 89 PID 1860 wrote to memory of 2120 1860 0be1f445537f124b5175e1f2d1da87e2e57aa4ba09ea5fe72b7bafaf0b8f9ad2.exe 89 PID 1860 wrote to memory of 2120 1860 0be1f445537f124b5175e1f2d1da87e2e57aa4ba09ea5fe72b7bafaf0b8f9ad2.exe 89 PID 2120 wrote to memory of 3680 2120 {34184A33-0407-212E-3320-09040709E2C2}.exe 91 PID 2120 wrote to memory of 3680 2120 {34184A33-0407-212E-3320-09040709E2C2}.exe 91 PID 2120 wrote to memory of 3680 2120 {34184A33-0407-212E-3320-09040709E2C2}.exe 91 PID 2932 wrote to memory of 4224 2932 cmd.exe 94 PID 2932 wrote to memory of 4224 2932 cmd.exe 94 PID 2932 wrote to memory of 4224 2932 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\0be1f445537f124b5175e1f2d1da87e2e57aa4ba09ea5fe72b7bafaf0b8f9ad2.exe"C:\Users\Admin\AppData\Local\Temp\0be1f445537f124b5175e1f2d1da87e2e57aa4ba09ea5fe72b7bafaf0b8f9ad2.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\AppData\Local\Temp\0be1f445537f124b5175e1f2d1da87e2e57aa4ba09ea5fe72b7bafaf0b8f9ad2.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w000002183⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exeC:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696KB
MD5b17603f401719f1d99ad6472f8d6682a
SHA17bb8e39ac06ff30a7f950915eede119355f15a27
SHA2560be1f445537f124b5175e1f2d1da87e2e57aa4ba09ea5fe72b7bafaf0b8f9ad2
SHA512893465bd19cba61c8dfc4bc3a455f84bf93fc2ce67ca55493a1385a649e2996a66f45fa337ce02b623b3eaf4f9d0fe233cee22c313452128db0ca2f99182fab5