Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 06:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-26_82721759c0af3065aab5a645f606c1a9_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-26_82721759c0af3065aab5a645f606c1a9_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-26_82721759c0af3065aab5a645f606c1a9_cryptolocker.exe
-
Size
44KB
-
MD5
82721759c0af3065aab5a645f606c1a9
-
SHA1
a01391e503ba106f27094d9140486916942d46bf
-
SHA256
27d25f2bfe7bacd73722b1fa2f998075fcb4756f839794d916e58e2dc2c11b0c
-
SHA512
982837c1339ca526b8a55eea42556d7856b7211aa96dfdb642692ce72a516d4b6a13eec07d4c386b3446d7abed3120224cd00c5c0ed19325e98fa3a17241db24
-
SSDEEP
384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jb0nrlwfjDUk7F:bm74zYcgT/EkM0ryfjd7F
Malware Config
Signatures
-
Detection of CryptoLocker Variants 6 IoCs
resource yara_rule behavioral1/memory/2244-0-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000a000000012286-11.dat CryptoLocker_rule2 behavioral1/memory/2244-13-0x0000000001EB0000-0x0000000001EBD000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2244-16-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2348-17-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2348-27-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2348 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2244 2024-05-26_82721759c0af3065aab5a645f606c1a9_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2348 2244 2024-05-26_82721759c0af3065aab5a645f606c1a9_cryptolocker.exe 28 PID 2244 wrote to memory of 2348 2244 2024-05-26_82721759c0af3065aab5a645f606c1a9_cryptolocker.exe 28 PID 2244 wrote to memory of 2348 2244 2024-05-26_82721759c0af3065aab5a645f606c1a9_cryptolocker.exe 28 PID 2244 wrote to memory of 2348 2244 2024-05-26_82721759c0af3065aab5a645f606c1a9_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_82721759c0af3065aab5a645f606c1a9_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-26_82721759c0af3065aab5a645f606c1a9_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD55ad1a3c693dffd8c25e79ee4ab4bfba5
SHA17c71e8ce4f9bb9f185c98ed6453c91cef95e7622
SHA256deb50d4871b418ebf6c925294f66d4601a030ef2079ac52f6c4cc497faf1ebf2
SHA51239085eb04af688663a11974ff823f060e4e5e87d84b4a67ae040044472ec70fe35528f81f756d58c3c117a2f3e9976b902cc73c4f79f265ef4f6f3c1b1b8611a