Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2024, 04:04

General

  • Target

    2024-03-06_fbd09989b625d988c873a8c598debf33_cryptolocker.exe

  • Size

    38KB

  • MD5

    fbd09989b625d988c873a8c598debf33

  • SHA1

    ce16c202bef301133beb0b0582ba8534d4fd6e49

  • SHA256

    6d2f4aaa61150976ed272f964538685b586124795164c97bae7eec12f7e11248

  • SHA512

    157433cf03c2ebf7652f402d3e6622f34a0e78cadc5d9eaa6d28158d19edb7001cffe550327c0afd9009b8e36943cdb5433e264fbc681cd1cf0a08540a616d4c

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6Dy8wJv:bIDOw9a0Dwo3P1ojvUSDhwB

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-06_fbd09989b625d988c873a8c598debf33_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-06_fbd09989b625d988c873a8c598debf33_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    38KB

    MD5

    cb2274d612b0fc98ac23f286f3c7a40c

    SHA1

    cd3ce625844b6e1e4a3d03ff76602fa24875665d

    SHA256

    ade40a347a60f104ece658f0b976b8bc26e8b032464828a35d1149ff64bb0c07

    SHA512

    09ffc49769fe7fefcaaf1196e2bc5b8f04e1316c03f4b8e5d2db7edfb6d1a46a80130cb9937c189351855f9b48911ce5d8a82f6c13a0d61ca8376224b5743b76

  • memory/2256-15-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2760-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2760-1-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/2760-8-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB