Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/02/2024, 03:32

General

  • Target

    2024-02-23_7151393f6d2756c26c9f8ededa3ba2bf_cryptolocker.exe

  • Size

    51KB

  • MD5

    7151393f6d2756c26c9f8ededa3ba2bf

  • SHA1

    6273db3f6723f4f055eb070d77edd3d6c363ebf8

  • SHA256

    486ec164136480deeadd75f9437f060ec68872766fed920206eea961a1c76a78

  • SHA512

    fcf2802557d66f8450eec66903df9a6c4f75676462a5fa2f3c8a21fb2546b131d9ca46511649a93ff507c8b480e7858cad079232d581991057ac771e14d66c6f

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4ICNBCXK9Xv+aGzQ9t:bIDOw9a0DwitDZzclqQ9t

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-23_7151393f6d2756c26c9f8ededa3ba2bf_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-23_7151393f6d2756c26c9f8ededa3ba2bf_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3252
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:4812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    52KB

    MD5

    67af34719850ea6af886194c2bbcc6e4

    SHA1

    97113c55e2cc5975a0e08d0289b0772cd97c2a49

    SHA256

    c681a2becc7005f019ce2685ec39a4b0f9a53c451f2d79b36f7c00a514a896c3

    SHA512

    2589c9d0e2df50658590f4dbb76a6ea5b01a13d7e520b35da8e72ab92715814d20170d36a5017fa2c1f8872b182a2e2372e67c1f567a3e89199e7a7d18d9943c

  • memory/3252-1-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/3252-0-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/3252-2-0x0000000000500000-0x0000000000506000-memory.dmp

    Filesize

    24KB

  • memory/4812-18-0x0000000001FC0000-0x0000000001FC6000-memory.dmp

    Filesize

    24KB

  • memory/4812-17-0x00000000020F0000-0x00000000020F6000-memory.dmp

    Filesize

    24KB