Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exe
-
Size
44KB
-
MD5
377de4b7d0f26bad361f85164387cd07
-
SHA1
19be1a96d0ab153165df3ab5414039c371bbeade
-
SHA256
86350fecd1ca48f4acf6f58d832964103b482fa0e30501bb9f02b004b9061b47
-
SHA512
c5b73b1774f7205b6c66c729fc1d9508938abcc0e0080bdfe2013b7e91cd51c018d4de2d357f8a9b4e2d0c8912609bbce33062a77ddbe6761240d833da87823e
-
SSDEEP
384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jo0nrlwfjDUpEui0U34:bm74zYcgT/Ekn0ryfjLu/
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2928-0-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 \Users\Admin\AppData\Local\Temp\hasfj.exe CryptoLocker_rule2 behavioral1/memory/2812-16-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2928-15-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2812-26-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
Processes:
hasfj.exepid process 2812 hasfj.exe -
Loads dropped DLL 1 IoCs
Processes:
2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exepid process 2928 2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exedescription pid process target process PID 2928 wrote to memory of 2812 2928 2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exe hasfj.exe PID 2928 wrote to memory of 2812 2928 2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exe hasfj.exe PID 2928 wrote to memory of 2812 2928 2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exe hasfj.exe PID 2928 wrote to memory of 2812 2928 2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exe hasfj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD51cfe4c1b63522d18fda8633636e871da
SHA160ced373845ca0506a6f33d07c1ad2277a3579e0
SHA256b9369252ea5194863b9140bb69e5cddf346d4207722752bcc6e8113e9bca75b8
SHA5125018caf496b7c0e8bb3339eae09838e9909412b8e45f7296680ab350590806959041ed5ece811f13f00ada251cde4cb2cb356733041ce1c22ba309df66e78ee8