Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18-01-2024 13:42

General

  • Target

    2024-01-18_9f46c6231e4a3b70c8f1fc80841398c1_cryptolocker.exe

  • Size

    49KB

  • MD5

    9f46c6231e4a3b70c8f1fc80841398c1

  • SHA1

    ecc64ccf21d5490f894767e86fe64c0287305ac5

  • SHA256

    37aa672a726087cba83eb3776ccd862d10fc5e1c52238648d6513278b70ac792

  • SHA512

    310889dcac5075861c3104e9b39fb5fa99488f925a15ff0f56f2b8bd081931d0e8f387e3cf8ef671d5e7983924d0855d704d992c384ad89bd9dc35fffb660725

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6D8jnPxyV4tFVgQi:bIDOw9a0Dwo3P1ojvUSD4PRtFVgz

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-18_9f46c6231e4a3b70c8f1fc80841398c1_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-18_9f46c6231e4a3b70c8f1fc80841398c1_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    49KB

    MD5

    6fe11d55d9cabc08654e26ce2119f17f

    SHA1

    6aa17027db94ea9682164eac99e8eea08fd4245d

    SHA256

    fcadae2dbabcec3cb527bf8f47e4a1730cd290c7a64cb05314f5372032482566

    SHA512

    6d0ead8152ea7de4538d2b37b6344f61f9528dec7b7988d1e81fece3efc7b6c182a7a6945e67009fc5e3bdfae84c458b3c8c243beeee1c96b121ef5484c475c0

  • memory/2112-0-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2112-2-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2112-1-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/2676-22-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2676-15-0x0000000001C90000-0x0000000001C96000-memory.dmp

    Filesize

    24KB