Analysis
-
max time kernel
150s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-01-2024 23:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-18_f11b7aa1d782019f8005767227101a6b_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-18_f11b7aa1d782019f8005767227101a6b_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-18_f11b7aa1d782019f8005767227101a6b_cryptolocker.exe
-
Size
43KB
-
MD5
f11b7aa1d782019f8005767227101a6b
-
SHA1
03c77e80f90eb2f67b6146ad8e50d012a4240a46
-
SHA256
ac388de0ae5999c4bd5755b0cfd262451f7026e3a9634c4c7b7b03931cbbc1fb
-
SHA512
5dd5443122fc892e33e1a19ef6eebd5f86c9e42712ad0165b5d20286d756bdbb1b8255b5e418e0b53ca2cd38c5a9f616db7241eda3779a8e23b6312d151d3960
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Ylmbk:bgGYcA/53GAA6y37QmY
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001223f-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2844 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2396 2024-01-18_f11b7aa1d782019f8005767227101a6b_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2844 2396 2024-01-18_f11b7aa1d782019f8005767227101a6b_cryptolocker.exe 28 PID 2396 wrote to memory of 2844 2396 2024-01-18_f11b7aa1d782019f8005767227101a6b_cryptolocker.exe 28 PID 2396 wrote to memory of 2844 2396 2024-01-18_f11b7aa1d782019f8005767227101a6b_cryptolocker.exe 28 PID 2396 wrote to memory of 2844 2396 2024-01-18_f11b7aa1d782019f8005767227101a6b_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-18_f11b7aa1d782019f8005767227101a6b_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-18_f11b7aa1d782019f8005767227101a6b_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD50794b54fa18ba119169ee2571ecbba02
SHA17fa7a6bbea2d28e94e2661472eb9045cda26ba81
SHA25678318653d0b0c3979d6d83614b5ef9f889cb8fde9fca62609146cada92f09bac
SHA51238be532e2f049082be20e96965a75d77e28f950008ecf23939d543077ca687f4cce2f01a5f295da528490090f374a81c65a68c0a203f702951375c12babafa02