Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-20_58c7153b50220b7e18ccc5bdbcd55107_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-20_58c7153b50220b7e18ccc5bdbcd55107_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-20_58c7153b50220b7e18ccc5bdbcd55107_cryptolocker.exe
-
Size
32KB
-
MD5
58c7153b50220b7e18ccc5bdbcd55107
-
SHA1
84ba0f0c4c2d28be07654cdc6343427d04b48c27
-
SHA256
9e719417f6784b85ff4c007599b3b38e5d6afe10f380afca4a2ad0c41df4e4ee
-
SHA512
536934c821c6e806a742ed2e482a599530e6da5d3f09998e48f0fae3fbc4e1f45be08bb8e85af14a581e402e2dde1bedbc4bcf1890c7d36cb0b325355821d597
-
SSDEEP
384:bG74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUGTGXv:bG74zYcgT/Ekd0ryfjC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2416 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2428 2024-06-20_58c7153b50220b7e18ccc5bdbcd55107_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2416 2428 2024-06-20_58c7153b50220b7e18ccc5bdbcd55107_cryptolocker.exe 28 PID 2428 wrote to memory of 2416 2428 2024-06-20_58c7153b50220b7e18ccc5bdbcd55107_cryptolocker.exe 28 PID 2428 wrote to memory of 2416 2428 2024-06-20_58c7153b50220b7e18ccc5bdbcd55107_cryptolocker.exe 28 PID 2428 wrote to memory of 2416 2428 2024-06-20_58c7153b50220b7e18ccc5bdbcd55107_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-20_58c7153b50220b7e18ccc5bdbcd55107_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-20_58c7153b50220b7e18ccc5bdbcd55107_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD56bb73db71415a3645c1ac0d51249bf4b
SHA1c8c0db9cca70d8a9389ded4b4c9bd9be19d02533
SHA25647ba3737ad52033789b080083eae1c5f8bcdee54229a55ee58c0d218eff10e14
SHA512fd6665bc63d3a45129b0f376b4f1d07456f54d7621fd394d635356a5d704cca97214ef098ee19f5fda421a90f0e410199f21628728b8bcc60ffddc87519c6c38