Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 14:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-14_46d6f58b5e0c4b2fae80f0ef98ae2527_cryptolocker.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-14_46d6f58b5e0c4b2fae80f0ef98ae2527_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-14_46d6f58b5e0c4b2fae80f0ef98ae2527_cryptolocker.exe
-
Size
34KB
-
MD5
46d6f58b5e0c4b2fae80f0ef98ae2527
-
SHA1
b5fe28d9d5f4e31715affd8a792814edcfe8909e
-
SHA256
781b04bc37cca57738860b30e24eae1a77f93634c0f857cca76ca5c96393783e
-
SHA512
b286c9918015b66f2bf46462400c6f6bc1ca6d82447c465a4189c844f2fdadf9b4473a04ee70fdf4764917f6e54f09ccbdafcf348eb5b23f9e9979ed54346fa6
-
SSDEEP
384:bG74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUGTGXvJF3J:bG74zYcgT/Ekd0ryfjkb5
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral2/memory/3016-0-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x000a0000000233d8-13.dat CryptoLocker_rule2 behavioral2/memory/3016-17-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral2/memory/3928-18-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral2/memory/3928-27-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 2024-06-14_46d6f58b5e0c4b2fae80f0ef98ae2527_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3928 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3016 wrote to memory of 3928 3016 2024-06-14_46d6f58b5e0c4b2fae80f0ef98ae2527_cryptolocker.exe 80 PID 3016 wrote to memory of 3928 3016 2024-06-14_46d6f58b5e0c4b2fae80f0ef98ae2527_cryptolocker.exe 80 PID 3016 wrote to memory of 3928 3016 2024-06-14_46d6f58b5e0c4b2fae80f0ef98ae2527_cryptolocker.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_46d6f58b5e0c4b2fae80f0ef98ae2527_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-14_46d6f58b5e0c4b2fae80f0ef98ae2527_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:3928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD553df183427fbb81fd750509ae581a9b4
SHA14f4b8b1aee88b2b12a63c03d9f2015361c92f5d3
SHA2565ff47073ef50d2ffdda59b5e79312a32135b2178188e9c79dabf87a6964de97c
SHA5122ca6e1d41c68e68cc59cc2552678b01a1f7d5a3d87e32461afa386c33cf1eb7479d04ccb9af1e27536864ab7e0945d30bd1a90a36e3481374eb807c84ac89746