Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 12:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-10_521612a32421273ce779cd41a803677c_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-10_521612a32421273ce779cd41a803677c_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-10_521612a32421273ce779cd41a803677c_cryptolocker.exe
-
Size
40KB
-
MD5
521612a32421273ce779cd41a803677c
-
SHA1
a981721f325ff81c7acc0f7e943ecf59ca0b1e28
-
SHA256
785b31d2ddd39821e5ef30a3bc05fd2a3fec45268115d45e83cc0289e67f3cd5
-
SHA512
c4fdb4b5f1dec57ac0a85a76ca24f474d75284fff4f3fa7708b8e47f9b7f3bc3f926b8c4d00aa12929d3c8f0b55d8d5a43a03440d438073130e1d6ac525e805b
-
SSDEEP
768:bA74zYcgT/Ekd0ryfjPIunqpeNswmT3Hwz:bA6YcA/X6G0W143Qz
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b000000015d31-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 760 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2044 2024-05-10_521612a32421273ce779cd41a803677c_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 760 2044 2024-05-10_521612a32421273ce779cd41a803677c_cryptolocker.exe 28 PID 2044 wrote to memory of 760 2044 2024-05-10_521612a32421273ce779cd41a803677c_cryptolocker.exe 28 PID 2044 wrote to memory of 760 2044 2024-05-10_521612a32421273ce779cd41a803677c_cryptolocker.exe 28 PID 2044 wrote to memory of 760 2044 2024-05-10_521612a32421273ce779cd41a803677c_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_521612a32421273ce779cd41a803677c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-10_521612a32421273ce779cd41a803677c_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD505f517b8047e1eab776039105b06e508
SHA16d6d92268ffa11896fc142ff8d16923594885cde
SHA256d5210a1fba392d488f6488997559142c0e232d1c2483d2755ebde78e0b4bd593
SHA512bb26ab3947e8ab785364db1031afcb041135adb2ab04e010c71975c3a1a76a71fa26f1a5712d5f2a9b6e8fbd88b2587d34a98d966721c1033721f2ec74b914f5