Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exe
-
Size
44KB
-
MD5
377de4b7d0f26bad361f85164387cd07
-
SHA1
19be1a96d0ab153165df3ab5414039c371bbeade
-
SHA256
86350fecd1ca48f4acf6f58d832964103b482fa0e30501bb9f02b004b9061b47
-
SHA512
c5b73b1774f7205b6c66c729fc1d9508938abcc0e0080bdfe2013b7e91cd51c018d4de2d357f8a9b4e2d0c8912609bbce33062a77ddbe6761240d833da87823e
-
SSDEEP
384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jo0nrlwfjDUpEui0U34:bm74zYcgT/Ekn0ryfjLu/
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2484-0-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 C:\Users\Admin\AppData\Local\Temp\hasfj.exe CryptoLocker_rule2 behavioral2/memory/2484-17-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 behavioral2/memory/4780-26-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exe -
Executes dropped EXE 1 IoCs
Processes:
hasfj.exepid process 4780 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exedescription pid process target process PID 2484 wrote to memory of 4780 2484 2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exe hasfj.exe PID 2484 wrote to memory of 4780 2484 2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exe hasfj.exe PID 2484 wrote to memory of 4780 2484 2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exe hasfj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-23_377de4b7d0f26bad361f85164387cd07_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:4780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD51cfe4c1b63522d18fda8633636e871da
SHA160ced373845ca0506a6f33d07c1ad2277a3579e0
SHA256b9369252ea5194863b9140bb69e5cddf346d4207722752bcc6e8113e9bca75b8
SHA5125018caf496b7c0e8bb3339eae09838e9909412b8e45f7296680ab350590806959041ed5ece811f13f00ada251cde4cb2cb356733041ce1c22ba309df66e78ee8