Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/01/2024, 00:21

General

  • Target

    2024-01-23_0211985466b883dc8876f89f7ab25865_cryptolocker.exe

  • Size

    46KB

  • MD5

    0211985466b883dc8876f89f7ab25865

  • SHA1

    f75d7b71af112a7bd5dd167c2f2d116788efde92

  • SHA256

    70dd6c527c3f190477ea0b26dde4d2a1fba9c94e2074c8a79a016034eab165c3

  • SHA512

    0b08f26c2aa230741e0aa74512333fa8f7ba8dee34b3eb95e08309bfab2a049ca402ebd61a980f62f010e8806b60fe1063d47f1b6aa08aa6b82c9a0abc8499e4

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6D8jnPxyV4tFpF0Lo:bIDOw9a0Dwo3P1ojvUSD4PRtFp4o

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-23_0211985466b883dc8876f89f7ab25865_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-23_0211985466b883dc8876f89f7ab25865_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    46KB

    MD5

    5e291249506a2bcf0686d627dc27d56a

    SHA1

    f8df264e6f7459d00cef2a060c351cf49da725f5

    SHA256

    d3a6d6bc21bc980d58f5c42fe0c4efdbe776a1f94ff48cfe09917e3d16cac4fa

    SHA512

    07d6b2972aa72c0995859a31ab607bd0c594e820ff8872f97fe8803d95bc2368d4a339f7dd59604cea325c528be94150b320d369164ad614e9f5f85761487d69

  • memory/2320-0-0x0000000002200000-0x0000000002206000-memory.dmp

    Filesize

    24KB

  • memory/2320-1-0x0000000002200000-0x0000000002206000-memory.dmp

    Filesize

    24KB

  • memory/2320-2-0x0000000002220000-0x0000000002226000-memory.dmp

    Filesize

    24KB

  • memory/2356-17-0x0000000002060000-0x0000000002066000-memory.dmp

    Filesize

    24KB

  • memory/2356-22-0x0000000002040000-0x0000000002046000-memory.dmp

    Filesize

    24KB