Analysis
-
max time kernel
0s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 05:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_b9253b435e5e6b9e8f100369c6f5f09c_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_b9253b435e5e6b9e8f100369c6f5f09c_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-01_b9253b435e5e6b9e8f100369c6f5f09c_cryptolocker.exe
-
Size
45KB
-
MD5
b9253b435e5e6b9e8f100369c6f5f09c
-
SHA1
8e354de995e7e047bba575923a4e7a95a2bcb05d
-
SHA256
86fb4b8b2a8ddad9cf870797857eb169d88e84476ff0f57b2f9eb78932016629
-
SHA512
c559bf4fbfb06cf310e8edf94f4ba9d91d62ac9ea0b3834f3a6afaaab1ebd34299623070fc62e767501a19c744ba10223a3a906d21095b1ffdc6fa74222ad88d
-
SSDEEP
768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6D8jnPxyV4tFw:bIDOw9a0Dwo3P1ojvUSD4PRtFw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2208 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 2496 2024-01-01_b9253b435e5e6b9e8f100369c6f5f09c_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2208 2496 2024-01-01_b9253b435e5e6b9e8f100369c6f5f09c_cryptolocker.exe 16 PID 2496 wrote to memory of 2208 2496 2024-01-01_b9253b435e5e6b9e8f100369c6f5f09c_cryptolocker.exe 16 PID 2496 wrote to memory of 2208 2496 2024-01-01_b9253b435e5e6b9e8f100369c6f5f09c_cryptolocker.exe 16 PID 2496 wrote to memory of 2208 2496 2024-01-01_b9253b435e5e6b9e8f100369c6f5f09c_cryptolocker.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"1⤵
- Executes dropped EXE
PID:2208
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_b9253b435e5e6b9e8f100369c6f5f09c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_b9253b435e5e6b9e8f100369c6f5f09c_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2496