Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    01/02/2024, 23:29

General

  • Target

    2024-02-01_a49a7295915aa2c7342b585aba3109ae_cryptolocker.exe

  • Size

    39KB

  • MD5

    a49a7295915aa2c7342b585aba3109ae

  • SHA1

    30609cb8cce8c33aed72463afa7177a9985a1357

  • SHA256

    a5f4592cd1f6065c79ec1c616d01568c9827265bca2771bf506a3cad27dd55bc

  • SHA512

    81b30798601fb913825523629ad9ffbe1e4ad87886b3966bec4806896a38d4e81d81a196a9b53534cfd6d83c6c8480d7c6a9712be8be44d57d39814d41db83ab

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6Dy8POK2:bIDOw9a0Dwo3P1ojvUSDhY

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-01_a49a7295915aa2c7342b585aba3109ae_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-01_a49a7295915aa2c7342b585aba3109ae_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:2884

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\lossy.exe

          Filesize

          39KB

          MD5

          101558820082327e33bcadfdeccbc5a9

          SHA1

          857b3ec651853fa186159811ea443cde2445c347

          SHA256

          4194e79eca458b6601cfe6d6106695926ec34296407e27a2a03d9f1f5c99777f

          SHA512

          5df1c17daef26f27a472574144dc9970294206d7c9d23f14d50514da445b47fd4f7797adbe21daa15e3e732fda0d173aec5f715f3196631120255444010a9f75

        • memory/2884-15-0x00000000004A0000-0x00000000004A6000-memory.dmp

          Filesize

          24KB

        • memory/2884-22-0x0000000000300000-0x0000000000306000-memory.dmp

          Filesize

          24KB

        • memory/3040-0-0x0000000000310000-0x0000000000316000-memory.dmp

          Filesize

          24KB

        • memory/3040-1-0x00000000004B0000-0x00000000004B6000-memory.dmp

          Filesize

          24KB

        • memory/3040-8-0x0000000000310000-0x0000000000316000-memory.dmp

          Filesize

          24KB