Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 19:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-26_c0aea71180786b377a6ec463b42bc047_cryptolocker.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2024-03-26_c0aea71180786b377a6ec463b42bc047_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-26_c0aea71180786b377a6ec463b42bc047_cryptolocker.exe
-
Size
43KB
-
MD5
c0aea71180786b377a6ec463b42bc047
-
SHA1
d0842dcef86e424f5c71fc8e7c1766bbfedac11e
-
SHA256
bf74708843e15c88a21c089c19d3fb94330cf6aa309a7ddcb425027d0e314850
-
SHA512
0369ad013b6b4865d6cc6c3ca28c916d46ad65cd81c55921cf867a79ba5c994a1243cf2bf12d0f38a59e8dab774bc6c6c70208b1e9ab6f8e8c9dbab7d765d659
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDDw3sCu5b+syQNSDj:bgGYcA/53GADw8Cl/l
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b0000000121cc-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2340 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 544 2024-03-26_c0aea71180786b377a6ec463b42bc047_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 544 wrote to memory of 2340 544 2024-03-26_c0aea71180786b377a6ec463b42bc047_cryptolocker.exe 28 PID 544 wrote to memory of 2340 544 2024-03-26_c0aea71180786b377a6ec463b42bc047_cryptolocker.exe 28 PID 544 wrote to memory of 2340 544 2024-03-26_c0aea71180786b377a6ec463b42bc047_cryptolocker.exe 28 PID 544 wrote to memory of 2340 544 2024-03-26_c0aea71180786b377a6ec463b42bc047_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-26_c0aea71180786b377a6ec463b42bc047_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-26_c0aea71180786b377a6ec463b42bc047_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5d762483545e2352a625689a286d69fa1
SHA1dffd1c03567d45bcb82a38fcf7f1803e4fac0f77
SHA256d4981c3a074b98c600816321f7ec57c4006f161670a619008253ba5e80ccaa43
SHA51286438bff988b1c19039c78dc98c62c961fdbf87717dd0176d30c4b4065211d41434b992f454a617621a101e2e1f6f01f2ba26deb54b7e7b63554eb7730185467