Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 19:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-21_1a27b4a1cb4d20738aefbfbd0e604346_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-21_1a27b4a1cb4d20738aefbfbd0e604346_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-21_1a27b4a1cb4d20738aefbfbd0e604346_cryptolocker.exe
-
Size
52KB
-
MD5
1a27b4a1cb4d20738aefbfbd0e604346
-
SHA1
6e15c91503d9e1352916eb6282c0aa4c6a7caaa7
-
SHA256
1094890b2a5b8622cb91334bb97fc0107082a9ce9326d3776b0c3a6950e45485
-
SHA512
9ad4d823708c729cb8b6b002053e6c16b023ccba745a7e1e890855a11be82987e6c8764f084f328ecc1d6399ffdff5a35b659631067b1fd324229f5f88206192
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Yl6dIKld5CS4Gjn:bgGYcA/53GAA6y37Q6dI+d5QGz
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000300000001e97c-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation 2024-04-21_1a27b4a1cb4d20738aefbfbd0e604346_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3900 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2644 wrote to memory of 3900 2644 2024-04-21_1a27b4a1cb4d20738aefbfbd0e604346_cryptolocker.exe 87 PID 2644 wrote to memory of 3900 2644 2024-04-21_1a27b4a1cb4d20738aefbfbd0e604346_cryptolocker.exe 87 PID 2644 wrote to memory of 3900 2644 2024-04-21_1a27b4a1cb4d20738aefbfbd0e604346_cryptolocker.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_1a27b4a1cb4d20738aefbfbd0e604346_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-21_1a27b4a1cb4d20738aefbfbd0e604346_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:3900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5bfb5f8911b4426d26899a77e69904be3
SHA19a91638afadc5d7010ba417cd08021a7c156735d
SHA2569c06606012219c3401e27c324667c6c2c0906886a939ac9751ebdd48630bf298
SHA512c4812bff0d89333be132c09c50734eb82c6e7b2268a226312bf1a885280f3538f5fb7954b0b1d94ff33d28a29b26987d7c23cd907fc994c1460a0e182a30a595