Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-09_bceb82b2f20b16d9ee6555ddccee2403_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-09_bceb82b2f20b16d9ee6555ddccee2403_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-09_bceb82b2f20b16d9ee6555ddccee2403_cryptolocker.exe
-
Size
386KB
-
MD5
bceb82b2f20b16d9ee6555ddccee2403
-
SHA1
d0efd9e125fe2695b108efddf6d89eb5ecc50917
-
SHA256
8339080e52aeb9560afa1ed62aab7f9882de909564483eae5e0161a55cbc6a30
-
SHA512
1be43196381a6c2d162801c0cb32534702d1acb4308bcd075f5e18c06852b3994ce7ed3f449b81098f44d5916127bd84c8493a27383a4c058eb7fb85347ec932
-
SSDEEP
6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXK:nnOflT/ZFIjBz3xjTxynGUOUhXK
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000700000001ebc7-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation 2024-03-09_bceb82b2f20b16d9ee6555ddccee2403_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3312 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 220 wrote to memory of 3312 220 2024-03-09_bceb82b2f20b16d9ee6555ddccee2403_cryptolocker.exe 89 PID 220 wrote to memory of 3312 220 2024-03-09_bceb82b2f20b16d9ee6555ddccee2403_cryptolocker.exe 89 PID 220 wrote to memory of 3312 220 2024-03-09_bceb82b2f20b16d9ee6555ddccee2403_cryptolocker.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-09_bceb82b2f20b16d9ee6555ddccee2403_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-09_bceb82b2f20b16d9ee6555ddccee2403_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:3312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
386KB
MD571aa699623f83bd4ac1488f0734b7b4b
SHA10a1d06811929cb7e9956b1edf8102bc0b70cf47a
SHA25649677d1cf81e40f32727c38f8bb862bbc35678999a2b882bc69ffc209cb00a18
SHA512ebe5711ba1d0528d6967674c86e3b2e2374c537d565a00bc88a48760398ec30702d27b61d7363ba07ea9a81618a8212cff737de2c12fdd3ff587ba6e544237c9