Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 14:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-03_1eaa7404dc6c4fcee790cc4558080005_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-03_1eaa7404dc6c4fcee790cc4558080005_cryptolocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-03_1eaa7404dc6c4fcee790cc4558080005_cryptolocker.exe
-
Size
31KB
-
MD5
1eaa7404dc6c4fcee790cc4558080005
-
SHA1
4903fbb3cb8cbba9e4ee348c201a861f04c4cc9c
-
SHA256
cdbb7d0cfd838abbb36d2240e302719d09ec2ca430e4ebdb36aac6fc68e15e37
-
SHA512
fc02e0ee0a5abe7f90806463bf575801de9b923355d4708db315a82d364510ecd36dccb0f05a3dfb485f4d2de165e7b03c374f65c66f63759c0b1ea3b629c6e3
-
SSDEEP
384:bG74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUGTG7E:bG74zYcgT/Ekd0ryfjJ
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral2/memory/4180-0-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x000c000000023b5b-13.dat CryptoLocker_rule2 behavioral2/memory/4180-17-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral2/memory/2760-18-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral2/memory/2760-27-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation 2024-05-03_1eaa7404dc6c4fcee790cc4558080005_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2760 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4180 wrote to memory of 2760 4180 2024-05-03_1eaa7404dc6c4fcee790cc4558080005_cryptolocker.exe 84 PID 4180 wrote to memory of 2760 4180 2024-05-03_1eaa7404dc6c4fcee790cc4558080005_cryptolocker.exe 84 PID 4180 wrote to memory of 2760 4180 2024-05-03_1eaa7404dc6c4fcee790cc4558080005_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-03_1eaa7404dc6c4fcee790cc4558080005_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-03_1eaa7404dc6c4fcee790cc4558080005_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD58c1fcda80ec7d70211883d4cd6ba303e
SHA17a8640e4e2ed9ac7a8270bf4fac63bef8081af77
SHA256bed2c192f3fb2d6f10c14f739e91a5e1deded3e210a95c087562401dec2071bd
SHA512e13c81396637f97d4d128770bc2a7a349d5bd784cf991394f44c00da2a01dfe4fb98e2757f44a4bab7ba28b9cb285fdbb25ff12d9a15a95a62ee2430fd2fc415