Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2024, 05:48

General

  • Target

    2024-01-10_376e6714e51aecdc1ddf82485940f2ce_cryptolocker.exe

  • Size

    48KB

  • MD5

    376e6714e51aecdc1ddf82485940f2ce

  • SHA1

    a4f35380598c44082c694986cf96aeaddf33cc0b

  • SHA256

    ca45f975230d9768253ebc3ee5701ac00a1d05c89d50221c28ef7257fe9abbee

  • SHA512

    73bc23d2277a702ecf308e5924b2af86752520356b6d956c5e337d43a10862b06f0af81a7d227962fe4b1644fb05c97bf8e7cd718bf68a59a3330df597d1592a

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6D8jnPxyV4tFVgQT:bIDOw9a0Dwo3P1ojvUSD4PRtFVgS

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-10_376e6714e51aecdc1ddf82485940f2ce_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-10_376e6714e51aecdc1ddf82485940f2ce_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:2164

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lossy.exe

          Filesize

          49KB

          MD5

          55f96db3b351b7115920436c6fdfd18f

          SHA1

          28e3238165714042d4247aaf8f95e2b569544d83

          SHA256

          3413c69b65319f17bd7853a094980feb705ec5cc6e7ab1740674ecbfd6f4717e

          SHA512

          c2742feb16f3475ea7cc62b52b1f9a7ff4d3ed0cade47930614c1f254c9d21cd855d13da61a143f41d2053f4732e4a8786431ff92e379bd92b1500371b2520c2

        • memory/756-7-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/756-1-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB

        • memory/756-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/2164-22-0x0000000000250000-0x0000000000256000-memory.dmp

          Filesize

          24KB

        • memory/2164-15-0x0000000001C90000-0x0000000001C96000-memory.dmp

          Filesize

          24KB