Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-01-2024 21:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-26_cf171599c33712c9d9974459532e1b1f_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-26_cf171599c33712c9d9974459532e1b1f_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-26_cf171599c33712c9d9974459532e1b1f_cryptolocker.exe
-
Size
45KB
-
MD5
cf171599c33712c9d9974459532e1b1f
-
SHA1
ada459e1445488b0a4df3241b8f7cc685fd4ee8d
-
SHA256
6e02c7903c0d868e5e15df61e383f5fea70fbe1632d5876cb160a05b3f378d6b
-
SHA512
50cdfcb60fd42209a2935fff7476b97cbd86a8b35bbfb78a4cf322bbbd3825f8f8ee0ef1a68b70dd40f20d6aa67edc16fcbeb5a8cb0482cd651db86ce1a984ec
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37YbDu5z/hvb:bgGYcA/53GAA6y37nbz
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000900000001225c-13.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2116 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2432 2024-01-26_cf171599c33712c9d9974459532e1b1f_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2116 2432 2024-01-26_cf171599c33712c9d9974459532e1b1f_cryptolocker.exe 28 PID 2432 wrote to memory of 2116 2432 2024-01-26_cf171599c33712c9d9974459532e1b1f_cryptolocker.exe 28 PID 2432 wrote to memory of 2116 2432 2024-01-26_cf171599c33712c9d9974459532e1b1f_cryptolocker.exe 28 PID 2432 wrote to memory of 2116 2432 2024-01-26_cf171599c33712c9d9974459532e1b1f_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_cf171599c33712c9d9974459532e1b1f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-26_cf171599c33712c9d9974459532e1b1f_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD58ea04a0c252f9ffd8598c391c1b419cd
SHA1f41c477dc5dcde744b204342347fa5cd535c2473
SHA2568d079f451ce98ed2a263e4a530e75e6b1fd0cb1ff60c5b0e632c7d2701a7c1fb
SHA512b26d69e83e1702d40950428767fadabd3fe1adc876cab33a1e9abe8b17de4273337b8d8ae948bdcf8e7d9c82a1d51bd60fcdd37751e9213a3ae0024a95e6711e