Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 14:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-08_e8727f6e732b2a2f1268933880277c31_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-07-08_e8727f6e732b2a2f1268933880277c31_cryptolocker.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-08_e8727f6e732b2a2f1268933880277c31_cryptolocker.exe
-
Size
33KB
-
MD5
e8727f6e732b2a2f1268933880277c31
-
SHA1
5a568c5fdfb287575b45b67210184851e7c1cc5d
-
SHA256
cd0f306bdca074a7a17ee3e70d01f84fd61284e274a61e12e5849e618c8c81c3
-
SHA512
ec29aa8c83ef8ae15d6350a239a2133af70ca873a6933ad40a163640a4cf81f8544792ded1ee906ab5eb1cc7131ccae0ed264497e9ab978debb90e04d86e3794
-
SSDEEP
384:bG74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUGTGOF6:bG74zYcgT/Ekd0ryfjS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2864 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 1288 2024-07-08_e8727f6e732b2a2f1268933880277c31_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2864 1288 2024-07-08_e8727f6e732b2a2f1268933880277c31_cryptolocker.exe 28 PID 1288 wrote to memory of 2864 1288 2024-07-08_e8727f6e732b2a2f1268933880277c31_cryptolocker.exe 28 PID 1288 wrote to memory of 2864 1288 2024-07-08_e8727f6e732b2a2f1268933880277c31_cryptolocker.exe 28 PID 1288 wrote to memory of 2864 1288 2024-07-08_e8727f6e732b2a2f1268933880277c31_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-08_e8727f6e732b2a2f1268933880277c31_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-08_e8727f6e732b2a2f1268933880277c31_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5b05d22db6b1aeaf9becde1078ca013ef
SHA192501a58f45c3c7cb817010693fb2b33b2610c09
SHA256715c2fca8606d3fa928e79965202be99b0df5ba210c666337035f250bf091206
SHA51290ce87c05a479f3984668b53655b1b1d9a06539532a3c5b2c4880526f1bf10942380ad36bbb91fe62466e65157210d9aa25b63155c136b4d4e1df3b20504991c