Analysis
-
max time kernel
154s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2024 21:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-26_cf171599c33712c9d9974459532e1b1f_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-26_cf171599c33712c9d9974459532e1b1f_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-26_cf171599c33712c9d9974459532e1b1f_cryptolocker.exe
-
Size
45KB
-
MD5
cf171599c33712c9d9974459532e1b1f
-
SHA1
ada459e1445488b0a4df3241b8f7cc685fd4ee8d
-
SHA256
6e02c7903c0d868e5e15df61e383f5fea70fbe1632d5876cb160a05b3f378d6b
-
SHA512
50cdfcb60fd42209a2935fff7476b97cbd86a8b35bbfb78a4cf322bbbd3825f8f8ee0ef1a68b70dd40f20d6aa67edc16fcbeb5a8cb0482cd651db86ce1a984ec
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37YbDu5z/hvb:bgGYcA/53GAA6y37nbz
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0009000000022480-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 2024-01-26_cf171599c33712c9d9974459532e1b1f_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4340 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4720 wrote to memory of 4340 4720 2024-01-26_cf171599c33712c9d9974459532e1b1f_cryptolocker.exe 88 PID 4720 wrote to memory of 4340 4720 2024-01-26_cf171599c33712c9d9974459532e1b1f_cryptolocker.exe 88 PID 4720 wrote to memory of 4340 4720 2024-01-26_cf171599c33712c9d9974459532e1b1f_cryptolocker.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_cf171599c33712c9d9974459532e1b1f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-26_cf171599c33712c9d9974459532e1b1f_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:4340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD58ea04a0c252f9ffd8598c391c1b419cd
SHA1f41c477dc5dcde744b204342347fa5cd535c2473
SHA2568d079f451ce98ed2a263e4a530e75e6b1fd0cb1ff60c5b0e632c7d2701a7c1fb
SHA512b26d69e83e1702d40950428767fadabd3fe1adc876cab33a1e9abe8b17de4273337b8d8ae948bdcf8e7d9c82a1d51bd60fcdd37751e9213a3ae0024a95e6711e