Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-02-2024 16:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_57d088e5e73df5461ea46e0c8e33b8b0_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_57d088e5e73df5461ea46e0c8e33b8b0_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-23_57d088e5e73df5461ea46e0c8e33b8b0_cryptolocker.exe
-
Size
38KB
-
MD5
57d088e5e73df5461ea46e0c8e33b8b0
-
SHA1
70d6eb1970e09628750e6f041700b92941cc2575
-
SHA256
740e3e83ef7cfeb2cf0c5045131d70382999c2f7117b32f8be44810b25b71795
-
SHA512
da9739ec8ac9258303b5952be8424513b029fee6cf3cc8cddf5b1dcf07822561dc797c3289c4407801f16ddd4f25ede62bd62cfa7782d3c9de7b2b3318577865
-
SSDEEP
384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf0w3sp8u5cZnfX5:bgX4zYcgTEu6QOaryfjqDDw3sCu5mX5
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012254-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2564 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 1008 2024-02-23_57d088e5e73df5461ea46e0c8e33b8b0_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1008 wrote to memory of 2564 1008 2024-02-23_57d088e5e73df5461ea46e0c8e33b8b0_cryptolocker.exe 28 PID 1008 wrote to memory of 2564 1008 2024-02-23_57d088e5e73df5461ea46e0c8e33b8b0_cryptolocker.exe 28 PID 1008 wrote to memory of 2564 1008 2024-02-23_57d088e5e73df5461ea46e0c8e33b8b0_cryptolocker.exe 28 PID 1008 wrote to memory of 2564 1008 2024-02-23_57d088e5e73df5461ea46e0c8e33b8b0_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-23_57d088e5e73df5461ea46e0c8e33b8b0_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-23_57d088e5e73df5461ea46e0c8e33b8b0_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5e1b65e2bab920bc4727b251e98002b95
SHA10b4e999c5fef41ce8e599b85f4c3ebea21bca68f
SHA256492501b087cc3d53562d3e916bf027401118e31b61f6301a342dfc167509cf8b
SHA512b690bc33a6d0171c7b0a5481a44d3c80bccf83b30b61b5858fb60ffc8e5b59663ad6caaeb4a40a6ecd8b068f085a3676d8d9263dff147c4d05db313a72183fc2