Analysis

  • max time kernel
    150s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/02/2024, 16:44

General

  • Target

    2024-02-19_9d46de951ed5e4c09f88cdc4897ba053_cryptolocker.exe

  • Size

    45KB

  • MD5

    9d46de951ed5e4c09f88cdc4897ba053

  • SHA1

    4e0c091552e2dd70d5a6326aa06acabea084df95

  • SHA256

    1e56714a4843d321f02e1dde08674a0308e9c0bf983d513b58a9beb1e6d6155d

  • SHA512

    e04d9a70c9ba60a021aea2c2fd0ec9aece23aceaa93b67c6b2300cb676cdc796fd22e99024692544e641401313efdf1302edad4bf7cb845490d210027fd12a91

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6D8jnPxysmC4Rnm:bIDOw9a0Dwo3P1ojvUSD4PWnm

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-19_9d46de951ed5e4c09f88cdc4897ba053_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-19_9d46de951ed5e4c09f88cdc4897ba053_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4572
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    45KB

    MD5

    1970c287afc116dfed17e7250a3dfbc6

    SHA1

    b43b2a25c8cf5b8fee739ea3ac50a518eb70cefe

    SHA256

    843cdb3297987b8e0d86f87557f0c5112b4bd23ffbd4371615e7ef2fe630d525

    SHA512

    24d77738b138f05485337857e665caf4b358d882982cf9455ac947a73f852c6868c772e3820fb9803c3d2639053e10fa8006034860ea40eaa1a4b21c8c561912

  • memory/2852-19-0x00000000021C0000-0x00000000021C6000-memory.dmp

    Filesize

    24KB

  • memory/2852-17-0x00000000020E0000-0x00000000020E6000-memory.dmp

    Filesize

    24KB

  • memory/4572-0-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/4572-1-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/4572-2-0x00000000021A0000-0x00000000021A6000-memory.dmp

    Filesize

    24KB