Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/02/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_a6045f83b2b9524b9f07487bfc7017ef_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-19_a6045f83b2b9524b9f07487bfc7017ef_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-19_a6045f83b2b9524b9f07487bfc7017ef_cryptolocker.exe
-
Size
30KB
-
MD5
a6045f83b2b9524b9f07487bfc7017ef
-
SHA1
ce48251b1480c921f363308cc381c50ead76ec96
-
SHA256
68aa37c3533154a3f9487728d775bf16fbc2ec48ef748b03fc61eb21be31648a
-
SHA512
0d9650e031a87b13ef598686f0f4cd5f9cea343e9be2388c01c6247a95ad14f4e9425eba001e0f5c5094131e8029e0e51a657e0aec859b2f4d9f82160d3f6d77
-
SSDEEP
384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUr766SJ5S+z/T:bA74zYcgT/Ekd0ryfjQRSnrjT
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012255-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2876 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2060 2024-02-19_a6045f83b2b9524b9f07487bfc7017ef_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2876 2060 2024-02-19_a6045f83b2b9524b9f07487bfc7017ef_cryptolocker.exe 28 PID 2060 wrote to memory of 2876 2060 2024-02-19_a6045f83b2b9524b9f07487bfc7017ef_cryptolocker.exe 28 PID 2060 wrote to memory of 2876 2060 2024-02-19_a6045f83b2b9524b9f07487bfc7017ef_cryptolocker.exe 28 PID 2060 wrote to memory of 2876 2060 2024-02-19_a6045f83b2b9524b9f07487bfc7017ef_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-19_a6045f83b2b9524b9f07487bfc7017ef_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-19_a6045f83b2b9524b9f07487bfc7017ef_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD59e5c3cbb0836f8a20248b5e834aeeff9
SHA19aed582a85879b4f9d1386984206a633c72c6e45
SHA256b35af51b98bd57f50e90287f322101e5ae12da9bb3766919c994b2d498abafc2
SHA512c39ec65455ec42d99960e96585d6bb360f6fee446bafd6aa7796a87991133a25e3a0a36e89c2602dbac103a11a7b4e86cc03ada4caf583a307e527c50bc492e0