Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-25_c142dfa604169bf561ceeaf2e6a3c293_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_c142dfa604169bf561ceeaf2e6a3c293_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-25_c142dfa604169bf561ceeaf2e6a3c293_cryptolocker.exe
-
Size
36KB
-
MD5
c142dfa604169bf561ceeaf2e6a3c293
-
SHA1
d33b2cb521f96d019778b73a38de473de3babfdf
-
SHA256
2e6b3da16ac51388eeff8abe2ee6ef786d22691d4e65e6444f211e598ebc45d3
-
SHA512
66114e1586217a65b0e6502454d6bee22e760f1a9eae281354cbc9b8c8d25269e167e54ca6b75b0b58f06ec236041c8b02cd69fa073ba152d55e73b362636e62
-
SSDEEP
384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUqMV6U8zKvGaLLA4:bA74zYcgT/Ekd0ryfj86U8zbCA4
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x00070000000231f8-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation 2024-02-25_c142dfa604169bf561ceeaf2e6a3c293_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4908 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2496 wrote to memory of 4908 2496 2024-02-25_c142dfa604169bf561ceeaf2e6a3c293_cryptolocker.exe 88 PID 2496 wrote to memory of 4908 2496 2024-02-25_c142dfa604169bf561ceeaf2e6a3c293_cryptolocker.exe 88 PID 2496 wrote to memory of 4908 2496 2024-02-25_c142dfa604169bf561ceeaf2e6a3c293_cryptolocker.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-25_c142dfa604169bf561ceeaf2e6a3c293_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-25_c142dfa604169bf561ceeaf2e6a3c293_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:4908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD500286b219cfc990345976f00de7965b4
SHA1b7ce543103a540c5b88d36b31584625b39327922
SHA25679f0667c398570199dd5675fbdd2edddf4fe23177e20af93e89d77c3e6c3c60b
SHA51263f0568aa0fb511a30175e272bf3ddf5ffa00c2ccc30fe83854384ab584dbb3edf7e2dbf45bce0be73b1c2575e2565ed5aed7a5d7b0b04a2b757d6109db2a45f