Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 20:03
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_74b9d683e1aceccfae39a6db4a63db0e_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_74b9d683e1aceccfae39a6db4a63db0e_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-12_74b9d683e1aceccfae39a6db4a63db0e_cryptolocker.exe
-
Size
41KB
-
MD5
74b9d683e1aceccfae39a6db4a63db0e
-
SHA1
77ed4461b54ccb503fb032a3854f02b668180c08
-
SHA256
5ce936f349da906042ea3955cdb4be9b05ece60bd033102ef54d88e3e9d4755b
-
SHA512
85716e3f2c6ed645c9c899931076ffa452403dd14070be1580124b5c1dcb2920a8fd1cb6568abe6dc345a94b6bbbf9ae6942f7a2036360aaf47799fbfa0ea833
-
SSDEEP
384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf0w3sp8u5co9+slG+:bgX4zYcgTEu6QOaryfjqDDw3sCu5b+sD
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\hasfj.exe CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2024-02-12_74b9d683e1aceccfae39a6db4a63db0e_cryptolocker.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 2024-02-12_74b9d683e1aceccfae39a6db4a63db0e_cryptolocker.exe -
Executes dropped EXE 1 IoCs
Processes:
hasfj.exepid process 2016 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-02-12_74b9d683e1aceccfae39a6db4a63db0e_cryptolocker.exedescription pid process target process PID 2980 wrote to memory of 2016 2980 2024-02-12_74b9d683e1aceccfae39a6db4a63db0e_cryptolocker.exe hasfj.exe PID 2980 wrote to memory of 2016 2980 2024-02-12_74b9d683e1aceccfae39a6db4a63db0e_cryptolocker.exe hasfj.exe PID 2980 wrote to memory of 2016 2980 2024-02-12_74b9d683e1aceccfae39a6db4a63db0e_cryptolocker.exe hasfj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_74b9d683e1aceccfae39a6db4a63db0e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_74b9d683e1aceccfae39a6db4a63db0e_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD54e162e452f55533bbcc590908e09a58b
SHA129ec47cbfb0ad93f5a5ac6f13abed17820edb7ce
SHA25644d6afa08cd0e8d3f3fcd7a06d40406aebc327bed4a07d983248256a8527fd96
SHA51249813e8396f76b8c073390611397a2b75414f9d94dbe862ff2577746457e48ad27108391ac5823ec197a4e604aa4e9c9d2816848ab9a267dd70f4ca346b4abdb