Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/04/2024, 22:41
Static task
static1
Behavioral task
behavioral1
Sample
f7601b08b75d1774f0bfe9bf69899b8194a85f4786c492a1fccf06f1e5f6ceb9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f7601b08b75d1774f0bfe9bf69899b8194a85f4786c492a1fccf06f1e5f6ceb9.exe
Resource
win10v2004-20240412-en
General
-
Target
f7601b08b75d1774f0bfe9bf69899b8194a85f4786c492a1fccf06f1e5f6ceb9.exe
-
Size
42KB
-
MD5
985cf6553b6810042f0409b0b58bac43
-
SHA1
182a5658e5d0bc393e0b49f21e7c4dce3f731290
-
SHA256
f7601b08b75d1774f0bfe9bf69899b8194a85f4786c492a1fccf06f1e5f6ceb9
-
SHA512
b175f603ff469a6058cc2ff8b60266dca920d63291fc6b6b3c6a89c8100f9d494ede416aea4d5ac788316297121d427a2f5e4c2057265441a12403dc7e16c8ba
-
SSDEEP
384:bm74uGLLQRcsdeQ72ngEr4K7YmE8uYo0nrlwfjDUOl:bm74zYcgT/Ek70ryfjBl
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/2936-0-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2936-15-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x0009000000015b6f-13.dat CryptoLocker_rule2 behavioral1/memory/2852-17-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2852-26-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2852 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2936 f7601b08b75d1774f0bfe9bf69899b8194a85f4786c492a1fccf06f1e5f6ceb9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2852 2936 f7601b08b75d1774f0bfe9bf69899b8194a85f4786c492a1fccf06f1e5f6ceb9.exe 28 PID 2936 wrote to memory of 2852 2936 f7601b08b75d1774f0bfe9bf69899b8194a85f4786c492a1fccf06f1e5f6ceb9.exe 28 PID 2936 wrote to memory of 2852 2936 f7601b08b75d1774f0bfe9bf69899b8194a85f4786c492a1fccf06f1e5f6ceb9.exe 28 PID 2936 wrote to memory of 2852 2936 f7601b08b75d1774f0bfe9bf69899b8194a85f4786c492a1fccf06f1e5f6ceb9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7601b08b75d1774f0bfe9bf69899b8194a85f4786c492a1fccf06f1e5f6ceb9.exe"C:\Users\Admin\AppData\Local\Temp\f7601b08b75d1774f0bfe9bf69899b8194a85f4786c492a1fccf06f1e5f6ceb9.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5029b36e3b045560ccea2dc0f3b7dec3a
SHA19f9c3a52a689566dd13009e8342a94eb5fa625e9
SHA2568456bdf4044e74cac1bd9cdde08798f1118f06a4d0acd43bce4c7a50c380a6a8
SHA512ab49882cb460a7d2ee09794906db4ee03d98eff6305149ad6507ab24de5a0820881d5bd0a54a66801cf742e1eb7c24dfdb475b75037c85416591e4dd11e3b924