Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_908b5aaccd18efc360d1593788f3de10_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_908b5aaccd18efc360d1593788f3de10_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-10_908b5aaccd18efc360d1593788f3de10_cryptolocker.exe
-
Size
38KB
-
MD5
908b5aaccd18efc360d1593788f3de10
-
SHA1
d9ee64b73bd4d0572bfb40cace8619b674eff806
-
SHA256
ec8226c2630b54467c230baa30d7965e6311665cc7aa17020c3dd477f5f827ea
-
SHA512
9e1813b564251e3af563bef46743977eae23afeb6b88afc50118a9264b576eb05c56b2661acc5d8fa7ab1f5a3b31fe07fa4beda8e27504427dde6829029722a5
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDDw3sCu529hJy:bgGYcA/53GADw8Ch9K
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2748 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2448 2024-01-10_908b5aaccd18efc360d1593788f3de10_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2748 2448 2024-01-10_908b5aaccd18efc360d1593788f3de10_cryptolocker.exe 28 PID 2448 wrote to memory of 2748 2448 2024-01-10_908b5aaccd18efc360d1593788f3de10_cryptolocker.exe 28 PID 2448 wrote to memory of 2748 2448 2024-01-10_908b5aaccd18efc360d1593788f3de10_cryptolocker.exe 28 PID 2448 wrote to memory of 2748 2448 2024-01-10_908b5aaccd18efc360d1593788f3de10_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_908b5aaccd18efc360d1593788f3de10_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_908b5aaccd18efc360d1593788f3de10_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD56ba9743e422b14d12d2defe2e9e9e34c
SHA1fd00f726ba176069d17fb6bcb65f6954bd71fc2a
SHA25673c3b06e4620d157b5114b628d8c6547832b7154905bac8feb132d6f9b371f3c
SHA512a818e88c64ff587880bb7091a2b988d9644b1cc8aede9c3d709c2ca8b2add07e0b90154eeb79e4a2662b0b450a873cd16913763a82c5cca5e9986d51e65b8c4c