Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-02-2024 05:28

General

  • Target

    2024-02-23_0fe6523fb6f6fef635dd822cc77c6bbc_cryptolocker.exe

  • Size

    40KB

  • MD5

    0fe6523fb6f6fef635dd822cc77c6bbc

  • SHA1

    4660cfddd59ce6b68d8260300839ec62d0ad9b5f

  • SHA256

    7b9618bd2d5aa757334f37e577aef36960f244f3c877d65bc20ea7eaa3e9929f

  • SHA512

    cd271444be1bcf9357a4601c76138e959b16ffa5451c188c2684dfcedff27bb022d37e96c58a6c1715e1164cec4a07f79d826894a0da552b0124ed3a3bdf99b3

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6Dy8Pv7:bIDOw9a0Dwo3P1ojvUSDh7

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-23_0fe6523fb6f6fef635dd822cc77c6bbc_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-23_0fe6523fb6f6fef635dd822cc77c6bbc_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    40KB

    MD5

    eaa2d84e95d3ac80aa4a9c614622d431

    SHA1

    72b0bc2d038fec2e43eab5c77ed3551049236478

    SHA256

    a4ad52eeaf6fbf997d68a641502b3c25eb8c45a62baf459ff77afc070949f7d6

    SHA512

    6a0a51272f384c58360dd009cde6bbb347652012390546259704e1b21a026b9d46633809f10619de79924784d0c853499284965349df799ec001bb47687a92cf

  • memory/1956-0-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/1956-1-0x0000000000370000-0x0000000000376000-memory.dmp

    Filesize

    24KB

  • memory/1956-8-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB