Analysis
-
max time kernel
156s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 21:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-24_0f666a3685537396cdedb73f375f8b0a_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-24_0f666a3685537396cdedb73f375f8b0a_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-24_0f666a3685537396cdedb73f375f8b0a_cryptolocker.exe
-
Size
386KB
-
MD5
0f666a3685537396cdedb73f375f8b0a
-
SHA1
7c753fe79755a2e45145028b872cad6cb6f86c85
-
SHA256
429bcb60c5fd543540e2c89a04c878f78f39c886bf856de05bcb571aecce8c47
-
SHA512
fec5b0ec02c51a7ae5c96b6f21f8349446d80ed2af853d4bc1456e5dcb50a31f1e26727464c0bc099fbd793d8201d1cab9f915eeafb19a277ea3c94affb93bc0
-
SSDEEP
6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXI:nnOflT/ZFIjBz3xjTxynGUOUhXI
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x00080000000230f2-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation 2024-02-24_0f666a3685537396cdedb73f375f8b0a_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 1636 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1004 wrote to memory of 1636 1004 2024-02-24_0f666a3685537396cdedb73f375f8b0a_cryptolocker.exe 85 PID 1004 wrote to memory of 1636 1004 2024-02-24_0f666a3685537396cdedb73f375f8b0a_cryptolocker.exe 85 PID 1004 wrote to memory of 1636 1004 2024-02-24_0f666a3685537396cdedb73f375f8b0a_cryptolocker.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-24_0f666a3685537396cdedb73f375f8b0a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-24_0f666a3685537396cdedb73f375f8b0a_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:1636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
386KB
MD5ac382f5d21de893283d0fad6007080ce
SHA13c488739af17adfcb7ffca5d8c91d724b11e4b35
SHA256f69f76002b946d48605ef5a3d75e43f4f36d0e05885b0ca51d3f1e56f0601103
SHA512a3508850a1b8f9db71a1eebd90dbf8a9fe6dd1eceadcd0a0bcabebdc792059c726e55e3bfc12bbf10738a69d0a58a00e8d6cad174a7f6082d6467339ba3284eb