Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09-03-2024 15:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-09_520bcbbdff307a06c5d09c2001b2f2ec_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-09_520bcbbdff307a06c5d09c2001b2f2ec_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-09_520bcbbdff307a06c5d09c2001b2f2ec_cryptolocker.exe
-
Size
47KB
-
MD5
520bcbbdff307a06c5d09c2001b2f2ec
-
SHA1
3c7d757dd6fef62ce1c523bfe729685842a29561
-
SHA256
592ceaa4ed5c0a4da2b4a00063802e1363dccc24e9bc22b6ad2621ed0caaa5d1
-
SHA512
81bc598a8026f12f5619c803986f30fc5e6d2535e932e85debe61a0255ce377ad25ac96bf4ee85ca00ce85a230a51cc152fb761fe890d9e7581b23ad6c272c78
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37YbDu5z/hvvkb:bgGYcA/53GAA6y37nbO
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x00070000000122be-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2532 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2908 2024-03-09_520bcbbdff307a06c5d09c2001b2f2ec_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2532 2908 2024-03-09_520bcbbdff307a06c5d09c2001b2f2ec_cryptolocker.exe 28 PID 2908 wrote to memory of 2532 2908 2024-03-09_520bcbbdff307a06c5d09c2001b2f2ec_cryptolocker.exe 28 PID 2908 wrote to memory of 2532 2908 2024-03-09_520bcbbdff307a06c5d09c2001b2f2ec_cryptolocker.exe 28 PID 2908 wrote to memory of 2532 2908 2024-03-09_520bcbbdff307a06c5d09c2001b2f2ec_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-09_520bcbbdff307a06c5d09c2001b2f2ec_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-09_520bcbbdff307a06c5d09c2001b2f2ec_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5e9c295a3da920532ab4a3742bea4282b
SHA1ac828b18d84c0642907cbc83a3c3bfad9a34a021
SHA25611e353f5a06b0d35b251e9518a60397b6bc79eb8eca14da1bacc92e2c4711774
SHA512d8fcac6ec50dd3266dd6ec50fff98e0a8c3ccdc73ceb2f108d57be3d625775470d387a3ccf9aee3b0136f1e7d6afa918f84b1e1ec8a9b6181455e81242f21980