Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-13_ca88bcd89ec9edd8d9dc795d191e256a_cryptolocker.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-13_ca88bcd89ec9edd8d9dc795d191e256a_cryptolocker.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-13_ca88bcd89ec9edd8d9dc795d191e256a_cryptolocker.exe
-
Size
391KB
-
MD5
ca88bcd89ec9edd8d9dc795d191e256a
-
SHA1
3b7a74e1a91f4291ca4b4816cd16c0241433ff10
-
SHA256
6382547eadd9de0535b61a33693553f863bdc815d936ad7020f7275ecc455f0b
-
SHA512
e44a17ec363d5341d4218b67fdb1532a1e03fef388099408527485c88f2028e5464a3f959d884c4ceb1edacf61641e8b03e2e2eee043d6397b8723ebdd103b1e
-
SSDEEP
6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXRC:nnOflT/ZFIjBz3xjTxynGUOUhXRC
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000700000002336e-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation 2024-06-13_ca88bcd89ec9edd8d9dc795d191e256a_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 5068 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4356 wrote to memory of 5068 4356 2024-06-13_ca88bcd89ec9edd8d9dc795d191e256a_cryptolocker.exe 82 PID 4356 wrote to memory of 5068 4356 2024-06-13_ca88bcd89ec9edd8d9dc795d191e256a_cryptolocker.exe 82 PID 4356 wrote to memory of 5068 4356 2024-06-13_ca88bcd89ec9edd8d9dc795d191e256a_cryptolocker.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-13_ca88bcd89ec9edd8d9dc795d191e256a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-13_ca88bcd89ec9edd8d9dc795d191e256a_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:5068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD50e7e9db41ac0b8bc3964030311dd188c
SHA195a2965bb63aaa7a66a019b6edb263cf3550c23f
SHA2563c93449047dea06e957e18744ee2cff4968ad85048028373ed9ae2d76b924127
SHA512a4a3ea45601b772c7ba4a0a8b3153384f8997dd1f91cf935fb67f4b0d50687075d2e9c1675b6a46fc9413f3eb88e316c198222e020e1ca0dc447f8f5aa9a2260