Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 19:06
Behavioral task
behavioral1
Sample
2024-04-27_f84c030f32b902b3dd7bacb7c4a69060_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-27_f84c030f32b902b3dd7bacb7c4a69060_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-04-27_f84c030f32b902b3dd7bacb7c4a69060_cryptolocker.exe
-
Size
22KB
-
MD5
f84c030f32b902b3dd7bacb7c4a69060
-
SHA1
a618a22ee68bd95c742918334a6749056e0a941f
-
SHA256
621a76e010da44a2ed48b1d5dd59f65c2c0a32ee6076393d4909cdd415f90253
-
SHA512
353e6f13023cec677d5bf7346960e8f70fe3eb74df5ac4b69eddf1210d54a2ff5b965d0f4dc188af1d0829bb4c4218d8bafdc67bdc2712c65c4c95dd650e8db6
-
SSDEEP
384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HjI:bVCPwFRo6CpwXFXSqQXfjAU
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral2/memory/4396-0-0x0000000008000000-0x000000000800E000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x0009000000023410-13.dat CryptoLocker_rule2 behavioral2/memory/3524-16-0x0000000008000000-0x000000000800E000-memory.dmp CryptoLocker_rule2 behavioral2/memory/4396-19-0x0000000008000000-0x000000000800E000-memory.dmp CryptoLocker_rule2 behavioral2/memory/3524-28-0x0000000008000000-0x000000000800E000-memory.dmp CryptoLocker_rule2 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral2/memory/4396-0-0x0000000008000000-0x000000000800E000-memory.dmp UPX behavioral2/files/0x0009000000023410-13.dat UPX behavioral2/memory/3524-16-0x0000000008000000-0x000000000800E000-memory.dmp UPX behavioral2/memory/4396-19-0x0000000008000000-0x000000000800E000-memory.dmp UPX behavioral2/memory/3524-28-0x0000000008000000-0x000000000800E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation 2024-04-27_f84c030f32b902b3dd7bacb7c4a69060_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3524 hasfj.exe -
resource yara_rule behavioral2/memory/4396-0-0x0000000008000000-0x000000000800E000-memory.dmp upx behavioral2/files/0x0009000000023410-13.dat upx behavioral2/memory/3524-16-0x0000000008000000-0x000000000800E000-memory.dmp upx behavioral2/memory/4396-19-0x0000000008000000-0x000000000800E000-memory.dmp upx behavioral2/memory/3524-28-0x0000000008000000-0x000000000800E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4396 wrote to memory of 3524 4396 2024-04-27_f84c030f32b902b3dd7bacb7c4a69060_cryptolocker.exe 81 PID 4396 wrote to memory of 3524 4396 2024-04-27_f84c030f32b902b3dd7bacb7c4a69060_cryptolocker.exe 81 PID 4396 wrote to memory of 3524 4396 2024-04-27_f84c030f32b902b3dd7bacb7c4a69060_cryptolocker.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-27_f84c030f32b902b3dd7bacb7c4a69060_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-27_f84c030f32b902b3dd7bacb7c4a69060_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:3524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5e16d1c6c526eeaf95b1c6c44e0682b53
SHA12811f7fad5f933ffa82b122db1c906508f5e31e2
SHA256768beeda053dee6a340fe02c88d17c5c9352384a5b5af49fc9c3c90fd4a8fb5f
SHA51299d86056043d2f9006fa6b6f02d508d780b6b97663623646021f0ccfc767b6a6bb1ba99da09ae222562e51abf1d77c505aee0d6e2747149097b0b0301818206f