Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_abd726cc29ca039c001194d14495d1d1_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_abd726cc29ca039c001194d14495d1d1_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-10_abd726cc29ca039c001194d14495d1d1_cryptolocker.exe
-
Size
45KB
-
MD5
abd726cc29ca039c001194d14495d1d1
-
SHA1
7cf2924d74468b69010bc6223c69f4a02de2b31b
-
SHA256
449c4c6bc033064687d3bc459f490ddcfea90e182403e7efabf28bd255c4c40f
-
SHA512
d1d2f1dae27ae3157ee420deecfa90a47945f91f183ff7b4b4841a70fcb6a179a08b081405ac79cb2611ff927886ed5cf7f7e0407c6066d59d3d061b5f9e5992
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37YbDu5z/hQf:bgGYcA/53GAA6y37nbo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2320 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2324 2024-01-10_abd726cc29ca039c001194d14495d1d1_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2320 2324 2024-01-10_abd726cc29ca039c001194d14495d1d1_cryptolocker.exe 23 PID 2324 wrote to memory of 2320 2324 2024-01-10_abd726cc29ca039c001194d14495d1d1_cryptolocker.exe 23 PID 2324 wrote to memory of 2320 2324 2024-01-10_abd726cc29ca039c001194d14495d1d1_cryptolocker.exe 23 PID 2324 wrote to memory of 2320 2324 2024-01-10_abd726cc29ca039c001194d14495d1d1_cryptolocker.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_abd726cc29ca039c001194d14495d1d1_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_abd726cc29ca039c001194d14495d1d1_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD59525122100f99bcd9acc35aae9a9c123
SHA141b180fb25489e9b86a1671c5bbaf9dd561ae55f
SHA2560d788f1ae22ff46bf41b8c7e31bf419d4beadef56c04897ae948fab0a17fce53
SHA51278a642f0344a1a09b2c336ad07934d2743b90fe8c7a45ee8a0dc7faa1e3a8ac2eed0c80771493d948a9abe8591a583b44c8f45a29c36cf2bb84f3f175c701fff