Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 06:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-30_8a946abc7d6c1bb027ca7f495c6183e8_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-30_8a946abc7d6c1bb027ca7f495c6183e8_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-30_8a946abc7d6c1bb027ca7f495c6183e8_cryptolocker.exe
-
Size
41KB
-
MD5
8a946abc7d6c1bb027ca7f495c6183e8
-
SHA1
dcd64294a39f167ab6af5563afe402d00d7db6dc
-
SHA256
9de856cc4215d7c6db58e9a8f18803ac185b3f7340dc99d55589c04fab1543f6
-
SHA512
4be29150e70b647b1f6fcae76ee3ffc4a625cb85d27e2e89ce25dfaae6c5b19a4e9b91e52aeaaf38b3f5e48bc64e2200566c52af4b1d3e071eec4b72a3a146d7
-
SSDEEP
768:bA74zYcgT/Ekd0ryfjPIunqpeNswmT3HwnCO:bA6YcA/X6G0W143Qd
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0009000000023400-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 2024-05-30_8a946abc7d6c1bb027ca7f495c6183e8_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2540 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4224 wrote to memory of 2540 4224 2024-05-30_8a946abc7d6c1bb027ca7f495c6183e8_cryptolocker.exe 81 PID 4224 wrote to memory of 2540 4224 2024-05-30_8a946abc7d6c1bb027ca7f495c6183e8_cryptolocker.exe 81 PID 4224 wrote to memory of 2540 4224 2024-05-30_8a946abc7d6c1bb027ca7f495c6183e8_cryptolocker.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-30_8a946abc7d6c1bb027ca7f495c6183e8_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-30_8a946abc7d6c1bb027ca7f495c6183e8_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5cabf27845630886f5ac6e70394f69e5d
SHA19d673f3b7bfbd6cc7f14fe58a4a00cbef0ec9d04
SHA25662cb44f3cdfc29b23ff59b69030ad9418bb6005c9799969cda64d4989a9d4aa4
SHA5126db9e65c0b5fa90a4097552ef46da99f35f9813f0c6ce55f7a241f0b2d4593d0650f157b968684fa3c1e6d372e6e17d85089a72bf5b6e82febaa792485793fdc