Analysis
-
max time kernel
0s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_19df4e3828fffb4c996461e593d558dd_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-08_19df4e3828fffb4c996461e593d558dd_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-08_19df4e3828fffb4c996461e593d558dd_cryptolocker.exe
-
Size
44KB
-
MD5
19df4e3828fffb4c996461e593d558dd
-
SHA1
5e8b1b57cc4a3305629c2ee7b6386c520996e593
-
SHA256
d456ac5d61224ec7b6bfbee76612338af7ae0f7f91a131370ce0fde06be5f0fc
-
SHA512
911c130f082f7bdd7bac9bc5892d9135e81d6d6fcf7557cf3a8ebf4c71a5b655163a9292cb749bb8b84ed367034ff65b6be0bd6200add0e7222645b38576b436
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37YbDu5z/hT:bgGYcA/53GAA6y37nbT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2856 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2980 2024-01-08_19df4e3828fffb4c996461e593d558dd_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2856 2980 2024-01-08_19df4e3828fffb4c996461e593d558dd_cryptolocker.exe 17 PID 2980 wrote to memory of 2856 2980 2024-01-08_19df4e3828fffb4c996461e593d558dd_cryptolocker.exe 17 PID 2980 wrote to memory of 2856 2980 2024-01-08_19df4e3828fffb4c996461e593d558dd_cryptolocker.exe 17 PID 2980 wrote to memory of 2856 2980 2024-01-08_19df4e3828fffb4c996461e593d558dd_cryptolocker.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_19df4e3828fffb4c996461e593d558dd_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_19df4e3828fffb4c996461e593d558dd_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD55239a696961702f4460fbccd75f66a5d
SHA15288da0882ef51f62d867e2679ab5e98c27979b6
SHA256a022416bb9a44daef09729deef9264027358faf201f1786cf982aed9389fcecb
SHA51257309642ca9fa73e29aa77a7bedd1f809d8bf0d7c2d472d4399978a3fab7502be70d64f418e3c6d1f06f0c939bf84a1a92e173162aede67227678b629a57a8df