Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 00:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_299e1d3822830f70feae0b15874def67_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-16_299e1d3822830f70feae0b15874def67_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-16_299e1d3822830f70feae0b15874def67_cryptolocker.exe
-
Size
38KB
-
MD5
299e1d3822830f70feae0b15874def67
-
SHA1
929745cbd888a5ca980d46c903d73ff37b006e3b
-
SHA256
d641b0f3944449c7e5d5a930ac0b9908ca371a6ceb75ac31b19d170b75509cf7
-
SHA512
66ff1808f6cbb94462a62d8e79bd2dd51e8b0b3936a5ae748da49eccbbfa27b3fe57e1b0ed216eef7e1cd07517caa5eb26cc26b206fa750243a72b7694ff6f8a
-
SSDEEP
768:bA74zYcgT/Ekd0ryfjPIunqpeNswmT3Hh:bA6YcA/X6G0W143B
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000900000001227e-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 1444 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 1980 2024-04-16_299e1d3822830f70feae0b15874def67_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1444 1980 2024-04-16_299e1d3822830f70feae0b15874def67_cryptolocker.exe 28 PID 1980 wrote to memory of 1444 1980 2024-04-16_299e1d3822830f70feae0b15874def67_cryptolocker.exe 28 PID 1980 wrote to memory of 1444 1980 2024-04-16_299e1d3822830f70feae0b15874def67_cryptolocker.exe 28 PID 1980 wrote to memory of 1444 1980 2024-04-16_299e1d3822830f70feae0b15874def67_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_299e1d3822830f70feae0b15874def67_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_299e1d3822830f70feae0b15874def67_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:1444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5fa8863a9a3c6d4d948957f84f21afdf8
SHA147a86751eb8555520e1ddae9eb2ca133a8be214e
SHA256e65f49fef4f15092ff04e7a5f77688c2cf15f6f7965eb355b0274b801e3b425f
SHA5125a0006dcf36837e0a4ea01fd9516ff3b3044459201efffe6a621202487cd603327beedd30d86c844ec0e84e9c971d5dd007ca3a255c2e8ed2aeccf05ae894bca