Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-02-2024 08:45

General

  • Target

    2024-02-01_839adfb13cbd5602fedfd4cbbf0b2cb5_cryptolocker.exe

  • Size

    40KB

  • MD5

    839adfb13cbd5602fedfd4cbbf0b2cb5

  • SHA1

    5ff4fe9fe152fcb6a84993768805db35751ce4b6

  • SHA256

    c612d6b085d325a1686bf006e82628108a63af6e312ea8c4b62b7acddcca960f

  • SHA512

    57068b4df4379d5b66ca2ae798d648e5bee9d6929c6eaba4a31813e07b781e635d2a0d7c3ebd3ccee966ef97b4265206cba09f891a1b061a97b69306e8f42c01

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6Dy8PT:bIDOw9a0Dwo3P1ojvUSDhL

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-01_839adfb13cbd5602fedfd4cbbf0b2cb5_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-01_839adfb13cbd5602fedfd4cbbf0b2cb5_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    40KB

    MD5

    f4a760dbf12c42df09dbafb8ef5b39eb

    SHA1

    c16e763a8d16ddca0670d667eb7e322fa053af06

    SHA256

    afaad8c2b1c442131c6fd643bddd4bb042de04668ef9ca613d1ae3afef5d6a6f

    SHA512

    5159066669de6657713ef66be5b9e68bb0df0f7c26854e65ee2e609966e55db4ef6b3d3e97ef32202f073b1a3a23551f8ae88f5e8a409373bf8bb43878ca1f00

  • memory/2096-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2096-1-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2096-3-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2280-15-0x0000000000450000-0x0000000000456000-memory.dmp

    Filesize

    24KB

  • memory/2280-17-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB