Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/02/2024, 05:08

General

  • Target

    2024-02-25_c192ef7aec1823ef849b053102c2ee35_cryptolocker.exe

  • Size

    53KB

  • MD5

    c192ef7aec1823ef849b053102c2ee35

  • SHA1

    770e0dc9ab03dec2bff8ceac8ccd6d6cb0fbefab

  • SHA256

    0959ccceead632e1184c188651a0f7efcdff62872b123a1de295edaf8d1eccea

  • SHA512

    3536eabbe83df3c94dc82a537bb624670f72b8646051a93e3c2fbeee59d5ca07c2087e28b83806a49355b602c9530043780680bf4176498ec931d324a282485e

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4ICNBCXK9XbTbmhTT:bIDOw9a0DwitDZzcTe

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-25_c192ef7aec1823ef849b053102c2ee35_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-25_c192ef7aec1823ef849b053102c2ee35_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:1680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    53KB

    MD5

    757de12bce00816950a2c1847e17ce35

    SHA1

    b1c6091f90aa9824cf44b1092e54b10b1afa1679

    SHA256

    f04ced7373c44fed9b8fdeb7e41cc61fe0f60f3ca9cd1a271133420a4c375aba

    SHA512

    b1daecd192e8257db96f6a2baf7d69496674a5ea7eba51dbd9c1bb3b17f4ddcfa089715dbfe78736ad80aaf743827d15d03b8604938de32ef9f657b13b9d1c87

  • memory/1632-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1632-1-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/1632-8-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1680-15-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB