Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-28_cdd367f54defa08bb2d06312a286195c_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-28_cdd367f54defa08bb2d06312a286195c_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-28_cdd367f54defa08bb2d06312a286195c_cryptolocker.exe
-
Size
37KB
-
MD5
cdd367f54defa08bb2d06312a286195c
-
SHA1
65c37b5badb85f635f9d6e7b1bcf43673ee0ee43
-
SHA256
1f5a63fe040b636bad74de816d10f39881ac1084cc4a3d3e5dce2425e2d04f47
-
SHA512
e19fac088dbe64e8d9d0349661936943700d16cebcdbd3a79129fff1351a9f2f50c499912b35a709332f9e9ebe093ecddbfd76b30f72bad11a51e11aea1f6cd5
-
SSDEEP
384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUgIunexRlSrxV1PVGjD:bA74zYcgT/Ekd0ryfjPIunYwfPVyD
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b000000014230-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 1284 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2240 2024-05-28_cdd367f54defa08bb2d06312a286195c_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1284 2240 2024-05-28_cdd367f54defa08bb2d06312a286195c_cryptolocker.exe 28 PID 2240 wrote to memory of 1284 2240 2024-05-28_cdd367f54defa08bb2d06312a286195c_cryptolocker.exe 28 PID 2240 wrote to memory of 1284 2240 2024-05-28_cdd367f54defa08bb2d06312a286195c_cryptolocker.exe 28 PID 2240 wrote to memory of 1284 2240 2024-05-28_cdd367f54defa08bb2d06312a286195c_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_cdd367f54defa08bb2d06312a286195c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-28_cdd367f54defa08bb2d06312a286195c_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:1284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD555a72d69cb412a3ee64d181a730385e4
SHA1913ebd7808eaba30693d60d5d14b40e90e316fec
SHA25640736340c1393539b023fbeb58e1ede498182d3177e7a82273a95b4bc5694f14
SHA512ddd0e547580e3ba6680b14ae1df2250232d3432ff1ed1e047eb67479881fb66cd165dc0ce41587f627cc237715864f391b4f012707c795c40db49c3405b2cf0a