Analysis

  • max time kernel
    163s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2024, 06:42

General

  • Target

    2024-01-08_70c28db51ff20ea87bde5ff5e253f8ae_cryptolocker.exe

  • Size

    49KB

  • MD5

    70c28db51ff20ea87bde5ff5e253f8ae

  • SHA1

    81b7f66f225a5bbd95449e9c5cc79e64809f36c8

  • SHA256

    ea561dcb1b4f3de86814f77104a745c079c79034c12b8526d8104680dc06a394

  • SHA512

    3da4fb665f864af08d63cc0b8912f547ab0887ebd0780b554b37781969e1efe8b28c5298c3aa171b9e6d1bba5abcea8ab3a4fd06e56248086236efab6d937766

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4ICNBCXK9lH:bIDOw9a0DwitDZza

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-08_70c28db51ff20ea87bde5ff5e253f8ae_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-08_70c28db51ff20ea87bde5ff5e253f8ae_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4592
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:1156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    49KB

    MD5

    717d0a57c78b7a934bef9e25ddfc704b

    SHA1

    03211501aaa3b3c11423135d9b9088b62d4ddf8d

    SHA256

    3b5d88763c1f233bd4f969a7d2f0a7a768fe0d5732c3e6e6f7476d92ba1051f3

    SHA512

    6fde1e3693e17f91d76e17f85c3d2097ef6753c4690bb6ba47f602bd9ec34657a049420cc1e8be9c45cc5fbb04a129fadf525fc420d7d60be54a7477238e2892

  • memory/1156-17-0x0000000002050000-0x0000000002056000-memory.dmp

    Filesize

    24KB

  • memory/1156-23-0x0000000002130000-0x0000000002136000-memory.dmp

    Filesize

    24KB

  • memory/4592-0-0x0000000002310000-0x0000000002316000-memory.dmp

    Filesize

    24KB

  • memory/4592-1-0x0000000002310000-0x0000000002316000-memory.dmp

    Filesize

    24KB

  • memory/4592-2-0x0000000002220000-0x0000000002226000-memory.dmp

    Filesize

    24KB