Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-06-2024 15:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-07_68551dcdb1f668a0b136d43dc8eff041_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-07_68551dcdb1f668a0b136d43dc8eff041_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-07_68551dcdb1f668a0b136d43dc8eff041_cryptolocker.exe
-
Size
44KB
-
MD5
68551dcdb1f668a0b136d43dc8eff041
-
SHA1
359c3edca90e2427ec42b2b19d2a0aa13ce6a08b
-
SHA256
7f9edbe8e066b2279101b50e073143d563ff7f70e89b5ed55b296593223b15f7
-
SHA512
b8acaa6d707228bf834fd402b1bcc548d75d46b062cf8900b8b12abd759eb8213f86a6ff2e55ecf3e863a759bb6fa8113c5fd851c6478c6272e8e8fe8aaab4aa
-
SSDEEP
384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jo0nrlwfjDUIG6S:bm74zYcgT/Ekn0ryfjiZ
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/2440-0-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 behavioral1/memory/3016-17-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2440-15-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000b000000015a2d-14.dat CryptoLocker_rule2 behavioral1/memory/3016-27-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 3016 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2440 2024-06-07_68551dcdb1f668a0b136d43dc8eff041_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 3016 2440 2024-06-07_68551dcdb1f668a0b136d43dc8eff041_cryptolocker.exe 28 PID 2440 wrote to memory of 3016 2440 2024-06-07_68551dcdb1f668a0b136d43dc8eff041_cryptolocker.exe 28 PID 2440 wrote to memory of 3016 2440 2024-06-07_68551dcdb1f668a0b136d43dc8eff041_cryptolocker.exe 28 PID 2440 wrote to memory of 3016 2440 2024-06-07_68551dcdb1f668a0b136d43dc8eff041_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-07_68551dcdb1f668a0b136d43dc8eff041_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-07_68551dcdb1f668a0b136d43dc8eff041_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5fc79a037beb9e6ef6a624137b509eebe
SHA11f0bc72037b5c03decb713f1067c2ebfd863b476
SHA256661bb65bd866932da45dc2a589575cac94a34eb0d2d96d51cfee888deb992e53
SHA512fb57855946f16885d9c99ef70bc999d75ae6729e46a2fd87a45e49242fe44d2172ac8c87aaff8730370efd869ba7221271ea0a94ee7fa3f4d12d2ab8911d98e0