Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_2894f120eb1de14f6df4583d9f8b0bcd_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-16_2894f120eb1de14f6df4583d9f8b0bcd_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-16_2894f120eb1de14f6df4583d9f8b0bcd_cryptolocker.exe
-
Size
30KB
-
MD5
2894f120eb1de14f6df4583d9f8b0bcd
-
SHA1
b5f0b13cf4c915f1cfec67d45239bf1b15e7ccd9
-
SHA256
f59031b2d4470b0dd6460294f89fd663af249e7875074dcb319ab18f8cfd1a3c
-
SHA512
08d85af5c37de7f59d46fd1a8d9004bdc0b996a00cbc6b93529b7c589c368f1731fd9c77728d16b7ce6959a3662b20c1348eb6676e1bed6ae36ef1366cc912e4
-
SSDEEP
384:bG74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUGTG1:bG74zYcgT/Ekd0ryfj0
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/1724-0-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000b0000000139e0-11.dat CryptoLocker_rule2 behavioral1/memory/1724-15-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1888-16-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1888-26-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 1888 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 1724 2024-04-16_2894f120eb1de14f6df4583d9f8b0bcd_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1888 1724 2024-04-16_2894f120eb1de14f6df4583d9f8b0bcd_cryptolocker.exe 28 PID 1724 wrote to memory of 1888 1724 2024-04-16_2894f120eb1de14f6df4583d9f8b0bcd_cryptolocker.exe 28 PID 1724 wrote to memory of 1888 1724 2024-04-16_2894f120eb1de14f6df4583d9f8b0bcd_cryptolocker.exe 28 PID 1724 wrote to memory of 1888 1724 2024-04-16_2894f120eb1de14f6df4583d9f8b0bcd_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_2894f120eb1de14f6df4583d9f8b0bcd_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_2894f120eb1de14f6df4583d9f8b0bcd_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:1888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD56521b36a3d68a915fe2ec94f29562e76
SHA128f9c601753798c983e550205802e434d2800e1e
SHA256372fbda4f032b022b241b4ea5d3c538f0e3c1082130c11d04f5e2d541b3c215f
SHA512d76a4c7d5a28d3664e09c977a811e4ea73e9f8060fbdabb0667947fe911210250403c03125f350f38e224401fe5f514a3c1e286e8ed3882b4d88eb677e06e425