Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-04-2024 08:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-22_90a46d06ba1d029f110030ee752f5b90_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-22_90a46d06ba1d029f110030ee752f5b90_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-22_90a46d06ba1d029f110030ee752f5b90_cryptolocker.exe
-
Size
52KB
-
MD5
90a46d06ba1d029f110030ee752f5b90
-
SHA1
b426595b6aa76ae0ff8c1b4af57b612bf021fa99
-
SHA256
7890e2eb9882de372d872b61946bb80e7ebfa78e69178b8f81b0fdc78df05887
-
SHA512
a79aa5f5e2f2005cee312fbe4ecf13ad2dbe4de00e873d9ba19f8ce3c784def1e7e03abf7a6c05fdcbed334aedbd56ad8f4b73fbd61f784b4b369eb934e7a437
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Yl6dIKld5CS4Gjj:bgGYcA/53GAA6y37Q6dI+d5QG3
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001224c-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2892 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2508 2024-04-22_90a46d06ba1d029f110030ee752f5b90_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2892 2508 2024-04-22_90a46d06ba1d029f110030ee752f5b90_cryptolocker.exe 28 PID 2508 wrote to memory of 2892 2508 2024-04-22_90a46d06ba1d029f110030ee752f5b90_cryptolocker.exe 28 PID 2508 wrote to memory of 2892 2508 2024-04-22_90a46d06ba1d029f110030ee752f5b90_cryptolocker.exe 28 PID 2508 wrote to memory of 2892 2508 2024-04-22_90a46d06ba1d029f110030ee752f5b90_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_90a46d06ba1d029f110030ee752f5b90_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-22_90a46d06ba1d029f110030ee752f5b90_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD59c55d20a52b74899651a9d2d5d8e85da
SHA18fc7298d2ca53d9548d8b7addd0c96c2a30d7e02
SHA2562c59ccf76b1981ab7cb82baf727c17f76d1a3ece9d452bd98d4fa8bfa8577f83
SHA5121a3eb13b52b04a43db391b4a41af28970b8fc189ab2c6ee48d62dde75f75995f7d8b72335b89dcd4fbe2c841c980be6813e661cd2a919913f7be21e4dfaa1bcb