Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-20_847d8a42f17da8c6c33fcf823bf7901b_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-20_847d8a42f17da8c6c33fcf823bf7901b_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-20_847d8a42f17da8c6c33fcf823bf7901b_cryptolocker.exe
-
Size
39KB
-
MD5
847d8a42f17da8c6c33fcf823bf7901b
-
SHA1
e93812d567015be1a5ca5619aa13a8038bbb278d
-
SHA256
1d1244b1de201da94d7d1cf6923e059c681baa2b0edcd48be69f4d548a13871f
-
SHA512
65bbde56fc1bc623c9cf9192f6a1ee3bfb4d0c5614c8212049d0d45c848778f48056c3334460ef8c07efa4aac05d870b72c845290488aef95b18cdd57f8e925f
-
SSDEEP
768:bA74zYcgT/Ekd0ryfjPIunqpeNswmxT4HmQ:bA6YcA/X6G0W1BGQ
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000300000001e970-11.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation 2024-04-20_847d8a42f17da8c6c33fcf823bf7901b_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2892 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2892 2876 2024-04-20_847d8a42f17da8c6c33fcf823bf7901b_cryptolocker.exe 84 PID 2876 wrote to memory of 2892 2876 2024-04-20_847d8a42f17da8c6c33fcf823bf7901b_cryptolocker.exe 84 PID 2876 wrote to memory of 2892 2876 2024-04-20_847d8a42f17da8c6c33fcf823bf7901b_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-20_847d8a42f17da8c6c33fcf823bf7901b_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-20_847d8a42f17da8c6c33fcf823bf7901b_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5b51e2a349ab4166508ed865cbae554eb
SHA1fd4da9fd2d2edea3cebd4405e385528e460c7b99
SHA2568de6f792cce0ac7bfb478e1f37a13c82214e5dfb634063e5e6891f8f8f57cf2b
SHA5125b9f80f721e5efb7f7b062e603912477d5111cb7914e8c276c473eb8e72f401b3fd5bdccc0d522c75f3b623ee7f6b48a5e672b87dd3db84c7ea29585489f19e0