Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 05:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-21_80358f471a357b16ee56ad806b0ec390_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-21_80358f471a357b16ee56ad806b0ec390_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-21_80358f471a357b16ee56ad806b0ec390_cryptolocker.exe
-
Size
30KB
-
MD5
80358f471a357b16ee56ad806b0ec390
-
SHA1
d5425261997e06c3f7fcdc57f56040992ba60191
-
SHA256
bde140002420b5ee34e522ade10b4714321242d5734bc335e2ff43fb7c41c059
-
SHA512
ee4b6d791e02202b8aeb0018ca6be5e3d0f37f0b044724863749eef590c2d5101ed7ccfe5b0fbc12126cefb416b9dfc06fb1d5df100e17258d0f4f105a9c1808
-
SSDEEP
384:bG74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUGTGS6:bG74zYcgT/Ekd0ryfj4
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral2/memory/4568-0-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x001c00000001e97e-13.dat CryptoLocker_rule2 behavioral2/memory/924-18-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral2/memory/4568-17-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral2/memory/924-27-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation 2024-04-21_80358f471a357b16ee56ad806b0ec390_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 924 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4568 wrote to memory of 924 4568 2024-04-21_80358f471a357b16ee56ad806b0ec390_cryptolocker.exe 86 PID 4568 wrote to memory of 924 4568 2024-04-21_80358f471a357b16ee56ad806b0ec390_cryptolocker.exe 86 PID 4568 wrote to memory of 924 4568 2024-04-21_80358f471a357b16ee56ad806b0ec390_cryptolocker.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_80358f471a357b16ee56ad806b0ec390_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-21_80358f471a357b16ee56ad806b0ec390_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD59fa1b43064eea4b245f94bf2d2e6f139
SHA1ad654263de7cb1be139fef9cab25439865be0374
SHA2561e922cd697ac88e6afd40e0ecc958c9caa3bf2f7b8b3bf46bde3a3fd1711bf0c
SHA5126d720c873fb2ff2946af9ebd248c90511c7351d389d1b2806058083a027920fe456768177fe197f1d30e2e0f9093886c05d376c5e6455e0079c4f3785bc50d2a