Analysis Overview
SHA256
b012da4b935e42099d25b0e075a9bf000bd8d7562c227c27262471219d02f17c
Threat Level: Shows suspicious behavior
The file 2025-07-02_e738c388b6a93103b33cf92a34dc0eca_cryptolocker_elex was found to be: Shows suspicious behavior.
Malicious Activity Summary
Executes dropped EXE
Checks computer location settings
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Unsigned PE
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V16
Analysis: static1
Detonation Overview
Reported
2025-07-02 18:53
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2025-07-02 18:53
Reported
2025-07-02 18:56
Platform
win10v2004-20250502-en
Max time kernel
150s
Max time network
150s
Command Line
Signatures
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3951986358-4006919840-1009690842-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\2025-07-02_e738c388b6a93103b33cf92a34dc0eca_cryptolocker_elex.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\misid.exe | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\2025-07-02_e738c388b6a93103b33cf92a34dc0eca_cryptolocker_elex.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\misid.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1356 wrote to memory of 5988 | N/A | C:\Users\Admin\AppData\Local\Temp\2025-07-02_e738c388b6a93103b33cf92a34dc0eca_cryptolocker_elex.exe | C:\Users\Admin\AppData\Local\Temp\misid.exe |
| PID 1356 wrote to memory of 5988 | N/A | C:\Users\Admin\AppData\Local\Temp\2025-07-02_e738c388b6a93103b33cf92a34dc0eca_cryptolocker_elex.exe | C:\Users\Admin\AppData\Local\Temp\misid.exe |
| PID 1356 wrote to memory of 5988 | N/A | C:\Users\Admin\AppData\Local\Temp\2025-07-02_e738c388b6a93103b33cf92a34dc0eca_cryptolocker_elex.exe | C:\Users\Admin\AppData\Local\Temp\misid.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\2025-07-02_e738c388b6a93103b33cf92a34dc0eca_cryptolocker_elex.exe
"C:\Users\Admin\AppData\Local\Temp\2025-07-02_e738c388b6a93103b33cf92a34dc0eca_cryptolocker_elex.exe"
C:\Users\Admin\AppData\Local\Temp\misid.exe
"C:\Users\Admin\AppData\Local\Temp\misid.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | c.pki.goog | udp |
| GB | 142.250.179.227:80 | c.pki.goog | tcp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
Files
memory/1356-0-0x0000000000500000-0x000000000050F000-memory.dmp
memory/1356-1-0x00000000004C0000-0x00000000004C6000-memory.dmp
memory/1356-2-0x00000000004C0000-0x00000000004C6000-memory.dmp
memory/1356-3-0x00000000004E0000-0x00000000004E6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\misid.exe
| MD5 | c2de5d5aee1863853a262fcb5c0c0899 |
| SHA1 | ccf985a9e44851dd1a71dc314cb2e7a3e61bcffe |
| SHA256 | 67e4bce5f9f7a69fb550e00e53d003ba0a815fa804cda02d021e5fb19f0705e5 |
| SHA512 | 8085b9e709835ecc1d53d889e5f917650ab5c540b73b3077c4e07689e06ba547ba7f223e536779e0a916d4a06f8f3040675adb0830d7dc4cc3d358bed114bbc3 |
memory/1356-18-0x0000000000500000-0x000000000050F000-memory.dmp
memory/5988-20-0x00000000004D0000-0x00000000004D6000-memory.dmp
memory/5988-21-0x00000000004F0000-0x00000000004F6000-memory.dmp
memory/5988-27-0x0000000000500000-0x000000000050F000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2025-07-02 18:53
Reported
2025-07-02 18:56
Platform
win11-20250619-en
Max time kernel
150s
Max time network
149s
Command Line
Signatures
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\misid.exe | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\2025-07-02_e738c388b6a93103b33cf92a34dc0eca_cryptolocker_elex.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\misid.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1408 wrote to memory of 656 | N/A | C:\Users\Admin\AppData\Local\Temp\2025-07-02_e738c388b6a93103b33cf92a34dc0eca_cryptolocker_elex.exe | C:\Users\Admin\AppData\Local\Temp\misid.exe |
| PID 1408 wrote to memory of 656 | N/A | C:\Users\Admin\AppData\Local\Temp\2025-07-02_e738c388b6a93103b33cf92a34dc0eca_cryptolocker_elex.exe | C:\Users\Admin\AppData\Local\Temp\misid.exe |
| PID 1408 wrote to memory of 656 | N/A | C:\Users\Admin\AppData\Local\Temp\2025-07-02_e738c388b6a93103b33cf92a34dc0eca_cryptolocker_elex.exe | C:\Users\Admin\AppData\Local\Temp\misid.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\2025-07-02_e738c388b6a93103b33cf92a34dc0eca_cryptolocker_elex.exe
"C:\Users\Admin\AppData\Local\Temp\2025-07-02_e738c388b6a93103b33cf92a34dc0eca_cryptolocker_elex.exe"
C:\Users\Admin\AppData\Local\Temp\misid.exe
"C:\Users\Admin\AppData\Local\Temp\misid.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
| US | 8.8.8.8:53 | bestccc.com | udp |
Files
memory/1408-0-0x0000000000500000-0x000000000050F000-memory.dmp
memory/1408-1-0x00000000006F0000-0x00000000006F6000-memory.dmp
memory/1408-2-0x00000000006F0000-0x00000000006F6000-memory.dmp
memory/1408-3-0x0000000000710000-0x0000000000716000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\misid.exe
| MD5 | c2de5d5aee1863853a262fcb5c0c0899 |
| SHA1 | ccf985a9e44851dd1a71dc314cb2e7a3e61bcffe |
| SHA256 | 67e4bce5f9f7a69fb550e00e53d003ba0a815fa804cda02d021e5fb19f0705e5 |
| SHA512 | 8085b9e709835ecc1d53d889e5f917650ab5c540b73b3077c4e07689e06ba547ba7f223e536779e0a916d4a06f8f3040675adb0830d7dc4cc3d358bed114bbc3 |
memory/1408-16-0x0000000000500000-0x000000000050F000-memory.dmp
memory/656-19-0x00000000020D0000-0x00000000020D6000-memory.dmp
memory/656-20-0x0000000002200000-0x0000000002206000-memory.dmp
memory/656-26-0x0000000000500000-0x000000000050F000-memory.dmp