Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 19:03
Behavioral task
behavioral1
Sample
20240521871b5515c64891358b210eb49a0c2d7fcryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
20240521871b5515c64891358b210eb49a0c2d7fcryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
20240521871b5515c64891358b210eb49a0c2d7fcryptolocker.exe
-
Size
24KB
-
MD5
871b5515c64891358b210eb49a0c2d7f
-
SHA1
c59d23940a15b90bf00167c2d5dfea2f18a540d7
-
SHA256
6822a63856e3199e9635640d448844db2da11daec50f239d461e9832050a1bd0
-
SHA512
109a315fd6d14e0aeb3a91f8950ac4622a167ec6a7e9ce72332f601dff2ea365df4cc891ed9e32ed2377f4b7cb01ffbfbfc7ef76427024b0f069dbb06496f2df
-
SSDEEP
384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6HMJ23/:bVCPwFRo6CpwXFXSqQXfjAsJ+/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
hasfj.exepid process 1408 hasfj.exe -
Loads dropped DLL 1 IoCs
Processes:
20240521871b5515c64891358b210eb49a0c2d7fcryptolocker.exepid process 1948 20240521871b5515c64891358b210eb49a0c2d7fcryptolocker.exe -
Processes:
resource yara_rule behavioral1/memory/1948-1-0x0000000008000000-0x000000000800E000-memory.dmp upx behavioral1/memory/1948-15-0x0000000008000000-0x000000000800E000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\hasfj.exe upx behavioral1/memory/1408-17-0x0000000008000000-0x000000000800E000-memory.dmp upx behavioral1/memory/1408-27-0x0000000008000000-0x000000000800E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
20240521871b5515c64891358b210eb49a0c2d7fcryptolocker.exedescription pid process target process PID 1948 wrote to memory of 1408 1948 20240521871b5515c64891358b210eb49a0c2d7fcryptolocker.exe hasfj.exe PID 1948 wrote to memory of 1408 1948 20240521871b5515c64891358b210eb49a0c2d7fcryptolocker.exe hasfj.exe PID 1948 wrote to memory of 1408 1948 20240521871b5515c64891358b210eb49a0c2d7fcryptolocker.exe hasfj.exe PID 1948 wrote to memory of 1408 1948 20240521871b5515c64891358b210eb49a0c2d7fcryptolocker.exe hasfj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240521871b5515c64891358b210eb49a0c2d7fcryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\20240521871b5515c64891358b210eb49a0c2d7fcryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:1408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5a0d35a82a4bb35cf29e628a9769df14a
SHA1c02248acb5f42202dfaa571a7db03668952253b5
SHA256b4657fa44bde897c0f16ec83b6bd54c3101b9581fac8a5a37a1c6b956c390dae
SHA5122d82d27bcc2b1c71071d3b78da16cb88c3682ee7fde71c79abb3c1a89ed52432ddf976cead237c381afae2c4f61d25f35ed2d5b8a55f53eba6e2fd4559d96e26