Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_ad45c0e242459a2e68d3e8565b6fbfff_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-22_ad45c0e242459a2e68d3e8565b6fbfff_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-22_ad45c0e242459a2e68d3e8565b6fbfff_cryptolocker.exe
-
Size
33KB
-
MD5
ad45c0e242459a2e68d3e8565b6fbfff
-
SHA1
d1ce40fd8a86cb1a785450ace07d373bb8358947
-
SHA256
3c0ee3505c17a7021ffdf287d6088161d23b1c9bcecde1f8ee8647c76c58981e
-
SHA512
fb61c743402f844c0a05f1bc428a5be71a7d527a99e9f7dc8da55d50c2d94d7bd68f74734dfb6acfb97c59b84d3ba2cd155fb3e55e9bae7b79ee4a2527e99a67
-
SSDEEP
384:bG74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUGTGLZ9t:bG74zYcgT/Ekd0ryfjgjt
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2352-0-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 C:\Users\Admin\AppData\Local\Temp\hasfj.exe CryptoLocker_rule2 behavioral2/memory/2352-17-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral2/memory/2828-26-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2024-05-22_ad45c0e242459a2e68d3e8565b6fbfff_cryptolocker.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 2024-05-22_ad45c0e242459a2e68d3e8565b6fbfff_cryptolocker.exe -
Executes dropped EXE 1 IoCs
Processes:
hasfj.exepid process 2828 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-05-22_ad45c0e242459a2e68d3e8565b6fbfff_cryptolocker.exedescription pid process target process PID 2352 wrote to memory of 2828 2352 2024-05-22_ad45c0e242459a2e68d3e8565b6fbfff_cryptolocker.exe hasfj.exe PID 2352 wrote to memory of 2828 2352 2024-05-22_ad45c0e242459a2e68d3e8565b6fbfff_cryptolocker.exe hasfj.exe PID 2352 wrote to memory of 2828 2352 2024-05-22_ad45c0e242459a2e68d3e8565b6fbfff_cryptolocker.exe hasfj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_ad45c0e242459a2e68d3e8565b6fbfff_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_ad45c0e242459a2e68d3e8565b6fbfff_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD59b676b60de0cee0f72eaeefaea3aa5d2
SHA128fbe01a6b410c994ca3982d2c9679ac0c4f423b
SHA25632badf8a520b99c940b453320b42a541c0cd2396ce8a5af97f0489b970048c61
SHA512f572f0421e84a11e68608a268204ac6af1544d0ce55b1e7640ceb280cd3bc302a61b834f5157e4c42abe75b7516cce6a032e778b62dd858d7a05448fb7f72987