Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-29_707ad8f35093f671790dafdf7a3491be_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-29_707ad8f35093f671790dafdf7a3491be_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-29_707ad8f35093f671790dafdf7a3491be_cryptolocker.exe
-
Size
44KB
-
MD5
707ad8f35093f671790dafdf7a3491be
-
SHA1
e837da4b8b643cc7acff31c3c2f5f6ef2269891b
-
SHA256
a397c1dc15de721d5f83ff6540019ac966111852cc2744f0e57efb8f6c470eec
-
SHA512
8506794f1de656ac5742f43446a1a1cbb97c9743ac87621030a4ee5a63481fd4ff9369adaad6c5fbae031a46a755e087b3d3af41d59e6bc388160e71bb7f8aa6
-
SSDEEP
384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jb0nrlwfjDUki:bm74zYcgT/EkM0ryfjdi
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/2740-0-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000b0000000155e2-11.dat CryptoLocker_rule2 behavioral1/memory/2484-17-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2740-14-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2484-28-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2484 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2740 2024-05-29_707ad8f35093f671790dafdf7a3491be_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2484 2740 2024-05-29_707ad8f35093f671790dafdf7a3491be_cryptolocker.exe 28 PID 2740 wrote to memory of 2484 2740 2024-05-29_707ad8f35093f671790dafdf7a3491be_cryptolocker.exe 28 PID 2740 wrote to memory of 2484 2740 2024-05-29_707ad8f35093f671790dafdf7a3491be_cryptolocker.exe 28 PID 2740 wrote to memory of 2484 2740 2024-05-29_707ad8f35093f671790dafdf7a3491be_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-29_707ad8f35093f671790dafdf7a3491be_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-29_707ad8f35093f671790dafdf7a3491be_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD558b3e67461bc7c5c427ad73c5e82dd4b
SHA105b791a5e7e833d73db24ddcf3ffac85aaeb9800
SHA25655a0e7bbeb2cd887a23ec64513b281c3018ff29be118393d80c80b2d1667cc5d
SHA512c34bd130c3dd5ed48d11af6b70a78f6b585aac5e5dc0112f9ead4842f345383679ea425353aee4f7de87dc1b19085dc1530a432cd0346f2d05b11040214eb6d9