Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 03:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-28_ffec908131626d25b5249fd7c5a47380_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-28_ffec908131626d25b5249fd7c5a47380_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-28_ffec908131626d25b5249fd7c5a47380_cryptolocker.exe
-
Size
31KB
-
MD5
ffec908131626d25b5249fd7c5a47380
-
SHA1
f4861e3244298e24bec4f89aec0628819e703f50
-
SHA256
b508b548e6c149326a4035c86cabb24945c8f69fb20cef29963a06ed38858640
-
SHA512
a8b92fe22cc722695517c24ef6cb338c8c78b26b3a45d39413d20e3dc187b9d027fabccbc27dd8c1ee2103990c9b2cb5b1c3222a3981b467a35da0a236608036
-
SSDEEP
384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUgIunvsz:bA74zYcgT/Ekd0ryfjPIunvsz
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0006000000023228-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 2024-01-28_ffec908131626d25b5249fd7c5a47380_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2828 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4400 wrote to memory of 2828 4400 2024-01-28_ffec908131626d25b5249fd7c5a47380_cryptolocker.exe 88 PID 4400 wrote to memory of 2828 4400 2024-01-28_ffec908131626d25b5249fd7c5a47380_cryptolocker.exe 88 PID 4400 wrote to memory of 2828 4400 2024-01-28_ffec908131626d25b5249fd7c5a47380_cryptolocker.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-28_ffec908131626d25b5249fd7c5a47380_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-28_ffec908131626d25b5249fd7c5a47380_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5b5b0a6ffd2e470d13dabf4de7a423c51
SHA1b92c98977fe07ccb694ad910c0a30f5efe01cafe
SHA256b4509aa8273cc53c3e55ab40c3d69245fd97b4a8aa3ba623ff2c37cfe31613d1
SHA512e5ad2869adcf676a687d6112f626ea1e1db845f6e27e6eb0214f3f2d038131a2bb28d1dea19891995024c8be4de89e293bfb410fe1e56aaf9ef34a7b352753ac