Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 16:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-29_318937373ae596aa05240a69e2493371_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-29_318937373ae596aa05240a69e2493371_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-29_318937373ae596aa05240a69e2493371_cryptolocker.exe
-
Size
44KB
-
MD5
318937373ae596aa05240a69e2493371
-
SHA1
55aed17fa4e8494c965dfdd12afc88261c080722
-
SHA256
32dcbe867194c63a481277b78aa340f0221122be2368936652348ca3223839ba
-
SHA512
e63d88dd76cf157783026806bc84d65c984e06159f95f4e74f5303a3350c275424e7f384c738dc1d7b4853be0c145c1ef42e314244b1739daa9c182e8b6f5995
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37YlPvc:bgGYcA/53GAA6y37Qs
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023208-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 2024-01-29_318937373ae596aa05240a69e2493371_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2368 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4724 wrote to memory of 2368 4724 2024-01-29_318937373ae596aa05240a69e2493371_cryptolocker.exe 89 PID 4724 wrote to memory of 2368 4724 2024-01-29_318937373ae596aa05240a69e2493371_cryptolocker.exe 89 PID 4724 wrote to memory of 2368 4724 2024-01-29_318937373ae596aa05240a69e2493371_cryptolocker.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-29_318937373ae596aa05240a69e2493371_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-29_318937373ae596aa05240a69e2493371_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD53a4fc05a1f359c188f1b0ab064a86039
SHA14c80d67fc86af24a6c4b18923753c221d890a423
SHA256672a596a3c33e4c81f8ede6c71dea9239693d5fa5ed58f61b1a81a2e915fe544
SHA512630bb73cfdbcbecbbb7fc6ff646297c49c49b433374c037163c7223904fb512e2ea8d20347299bb1907e33bfd83d3a97f8eee8d9d90e251d32852b8df9819876