Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-02-2024 23:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-21_cb27ba7eb740b5a53b9cb7ca13e0335f_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-21_cb27ba7eb740b5a53b9cb7ca13e0335f_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-21_cb27ba7eb740b5a53b9cb7ca13e0335f_cryptolocker.exe
-
Size
49KB
-
MD5
cb27ba7eb740b5a53b9cb7ca13e0335f
-
SHA1
48e0e4e476e7a806e3fe9542670dadd6c4b5c749
-
SHA256
b87b9d06d6724a5b7f4d504df2b3d034324b543e16e50ac8ed593c1d6c6d002e
-
SHA512
376886ba4e9493a72c05bb9b592c2888ca74325cf5f0867571dbe9bce00761278ec4f22487f6e5929ef0815730f8ebe00364b44c51eb99961401d2bf8e277d56
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Yl6dIKld5CSy:bgGYcA/53GAA6y37Q6dI+d5q
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000900000001222b-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2932 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 1624 2024-02-21_cb27ba7eb740b5a53b9cb7ca13e0335f_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2932 1624 2024-02-21_cb27ba7eb740b5a53b9cb7ca13e0335f_cryptolocker.exe 28 PID 1624 wrote to memory of 2932 1624 2024-02-21_cb27ba7eb740b5a53b9cb7ca13e0335f_cryptolocker.exe 28 PID 1624 wrote to memory of 2932 1624 2024-02-21_cb27ba7eb740b5a53b9cb7ca13e0335f_cryptolocker.exe 28 PID 1624 wrote to memory of 2932 1624 2024-02-21_cb27ba7eb740b5a53b9cb7ca13e0335f_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-21_cb27ba7eb740b5a53b9cb7ca13e0335f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-21_cb27ba7eb740b5a53b9cb7ca13e0335f_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD539fbc046cb191856707ce74be76ecb01
SHA17154022248c078761a82f32f6a0681038ce1c257
SHA256ee069b6f4a0a77ec3b02a7a4836061f2773092e5df8bc3c4e5c4d0ace26b082f
SHA5120530cd5970c28c75325b639ef7cbe993126952158b0155bbe253eeae4a0205a92fa063d64826f61b20764c831b3292e06374a78e690bb7d59d5eced45137debc