Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-11_e2728dd0c81d71955fd4aff6997c7042_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-11_e2728dd0c81d71955fd4aff6997c7042_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-11_e2728dd0c81d71955fd4aff6997c7042_cryptolocker.exe
-
Size
45KB
-
MD5
e2728dd0c81d71955fd4aff6997c7042
-
SHA1
5390e88c778fbbb219d0196e9ccb10507d2151a9
-
SHA256
169a9750890b2e2ac3f197b6f8ed7a6e0075c4d32134f22a0f19446e77548ded
-
SHA512
a9ded1f6723aab9a3db6b1794cb5d2a901dc5c2cca54868ba6fd0198a4a2b20632560237534cf7a5d74947b84f1698406b64b51c58ff6c4508d31e6d67ce494b
-
SSDEEP
384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jb0nrlwfjDUadQC8k:bm74zYcgT/EkM0ryfjPdQZk
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral2/memory/2216-0-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x0007000000023278-13.dat CryptoLocker_rule2 behavioral2/memory/2216-17-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 behavioral2/memory/1980-25-0x0000000008000000-0x000000000800D000-memory.dmp CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 2024-06-11_e2728dd0c81d71955fd4aff6997c7042_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 1980 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2216 wrote to memory of 1980 2216 2024-06-11_e2728dd0c81d71955fd4aff6997c7042_cryptolocker.exe 83 PID 2216 wrote to memory of 1980 2216 2024-06-11_e2728dd0c81d71955fd4aff6997c7042_cryptolocker.exe 83 PID 2216 wrote to memory of 1980 2216 2024-06-11_e2728dd0c81d71955fd4aff6997c7042_cryptolocker.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_e2728dd0c81d71955fd4aff6997c7042_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-11_e2728dd0c81d71955fd4aff6997c7042_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:1980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD525baf13b084fe16b0dbeba577e20dc6b
SHA1c4c109435433200e0bb147531b48186aa1b3e8b7
SHA2565086a919c6c244e1d6f5c737c8d13d1be327af387c1c7c59f140f7f46dfbd1dd
SHA512c2b138dedc76772571615fdb182602552fa876326e91935ae212de839ea831a01466f53637088bf402d8e1d45272170778722977fb65c3bf2720017421a94011