Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 06:03
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_e809a7920c97365d5fccbdb893453eed_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_e809a7920c97365d5fccbdb893453eed_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-09_e809a7920c97365d5fccbdb893453eed_cryptolocker.exe
-
Size
38KB
-
MD5
e809a7920c97365d5fccbdb893453eed
-
SHA1
95a663182717c0c3af723b52ec403abc34cf0343
-
SHA256
20c07d20ddf2089403bac57e44455a1a53e8694cde679c80d4ff1809fed77fad
-
SHA512
5ee277fe8cef048a97b56c3e4480699c7d99c388027fb503ddc0a6042a65548c25575192c842017d603ae364e4497ee7053329483a01e1825e8639ed7a3a6406
-
SSDEEP
384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf0w3sp8u5cZ95d9hVl:bgX4zYcgTEu6QOaryfjqDDw3sCu529hv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2768 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 1784 2024-01-09_e809a7920c97365d5fccbdb893453eed_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1784 wrote to memory of 2768 1784 2024-01-09_e809a7920c97365d5fccbdb893453eed_cryptolocker.exe 28 PID 1784 wrote to memory of 2768 1784 2024-01-09_e809a7920c97365d5fccbdb893453eed_cryptolocker.exe 28 PID 1784 wrote to memory of 2768 1784 2024-01-09_e809a7920c97365d5fccbdb893453eed_cryptolocker.exe 28 PID 1784 wrote to memory of 2768 1784 2024-01-09_e809a7920c97365d5fccbdb893453eed_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-09_e809a7920c97365d5fccbdb893453eed_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-09_e809a7920c97365d5fccbdb893453eed_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD55b06462c721f86b02572f733a125c9c3
SHA1bd8cc4ce98539248fa45ffef5105a11b7db0e905
SHA256d054f7ea1f68ed5552c956ca392fae36a0005255081022a7398c2346c6011e38
SHA5124dbf58feebf4515a7e1bdfa4b35dc261932a8e7c8da77e94f44653e2dd1fd6cfcd566843e275b46e62f614e30ce548aefe5b3731368992ce7c7b55a628fe143e