Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 22:21
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_1346f7b2fddeee80a812cf4b9da9fd87_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-16_1346f7b2fddeee80a812cf4b9da9fd87_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-16_1346f7b2fddeee80a812cf4b9da9fd87_cryptolocker.exe
-
Size
51KB
-
MD5
1346f7b2fddeee80a812cf4b9da9fd87
-
SHA1
72e5e4d816c151000a78034db058d7a90caa6588
-
SHA256
f81820375a3cb9689a8018cd7b35a8aa9df8dc26f32099c88150cb0113bd2878
-
SHA512
d30e391e4b94dbfff0bbabf4ce44731825ca616a392cf4ce865034880df48e42d08927452631a4c1f9a8161d97e4d4268fff5e8949a9143b034b4ea52bea7757
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Yl6dIKld5CS4GjtY:bgGYcA/53GAA6y37Q6dI+d5QGZY
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b000000012256-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2176 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 1676 2024-04-16_1346f7b2fddeee80a812cf4b9da9fd87_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1676 wrote to memory of 2176 1676 2024-04-16_1346f7b2fddeee80a812cf4b9da9fd87_cryptolocker.exe 28 PID 1676 wrote to memory of 2176 1676 2024-04-16_1346f7b2fddeee80a812cf4b9da9fd87_cryptolocker.exe 28 PID 1676 wrote to memory of 2176 1676 2024-04-16_1346f7b2fddeee80a812cf4b9da9fd87_cryptolocker.exe 28 PID 1676 wrote to memory of 2176 1676 2024-04-16_1346f7b2fddeee80a812cf4b9da9fd87_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_1346f7b2fddeee80a812cf4b9da9fd87_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_1346f7b2fddeee80a812cf4b9da9fd87_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5768e2065f7a1a9d140bbc328f1dac1c9
SHA11dc462e75feec8d562ec663f7c9bed9c248a257b
SHA25686ae2e0f32e2baa5921d73b20f07f33528aeea725600b434a3f4d4b170d9c15f
SHA5126fa35f4cb695b73a692621dd6cb3682e2b83781934fce7943478ca6a25602a0500b7dca1f9ea77bdac028e8af119f74748211ccc5ac4797089d399dfb2233f98