Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-03-2024 00:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-29_837a2d22001b7b05550d65033c08169a_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-29_837a2d22001b7b05550d65033c08169a_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-29_837a2d22001b7b05550d65033c08169a_cryptolocker.exe
-
Size
46KB
-
MD5
837a2d22001b7b05550d65033c08169a
-
SHA1
da76579f4b451ab46daf6d77772b7d1544d98ad1
-
SHA256
b7e2f06631a6c3d968c08981d3ae736d32c01fed99b7fe2cf0ffc64e20d27dfb
-
SHA512
628c46818529e9b77a7c1ba751b9ea451702c3117d61ad94ce99b97b11e517751b1e024e9319559959e0f5cfef99852c37fd164184f8abcd29b5600192b18801
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37YbDu5z/hQcXv:bgGYcA/53GAA6y37nbr
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000a00000001224c-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2872 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 1936 2024-03-29_837a2d22001b7b05550d65033c08169a_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2872 1936 2024-03-29_837a2d22001b7b05550d65033c08169a_cryptolocker.exe 28 PID 1936 wrote to memory of 2872 1936 2024-03-29_837a2d22001b7b05550d65033c08169a_cryptolocker.exe 28 PID 1936 wrote to memory of 2872 1936 2024-03-29_837a2d22001b7b05550d65033c08169a_cryptolocker.exe 28 PID 1936 wrote to memory of 2872 1936 2024-03-29_837a2d22001b7b05550d65033c08169a_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_837a2d22001b7b05550d65033c08169a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-29_837a2d22001b7b05550d65033c08169a_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5bfb3f2500ac4eda8f6c9c034aab063b7
SHA1822f7e6e3b2e911cf61fe6c0f0183a6dd76c0ef3
SHA256790b6e7a3edb88b4b9b47b0d2778c14ce550a6252f62674d96f07df24690485d
SHA51244c1313b625fdd9f1d69811d889870c2cae21cd733f7b25fd7ec74edbc63e4e1d011be45b36a541dd2a73bc0be3572d5e0e3504805d35d198067eb7286eb6fc9