Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2024, 19:43

General

  • Target

    2024-03-19_0175e1b37b04eedbf7df20290e8556fb_cryptolocker.exe

  • Size

    39KB

  • MD5

    0175e1b37b04eedbf7df20290e8556fb

  • SHA1

    689aa45244b5bc320f8f071f9fa8e929b5755d02

  • SHA256

    69cdcc0fbace8262ae7975d97888cf22dee4bb3291c43ff3a2f9c5a4dd0c8805

  • SHA512

    3ca590e33a96aa2ac05d5c0cb4e08f2b3d3457e4718452ed97e49eeffc0ca9abe4f7befc38ee9d705b54c095e5fa9de9712115c1276101c363d7025f7c7f027d

  • SSDEEP

    768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAI:bCDOw9aMDooc+vAI

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-19_0175e1b37b04eedbf7df20290e8556fb_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-19_0175e1b37b04eedbf7df20290e8556fb_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4892
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:4460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    39KB

    MD5

    0c6563ed25f3ebba8b7969962250f00c

    SHA1

    73fd2014434e6ff8eb2f9cf0a480828ff31f9ae9

    SHA256

    40f36fbe1c8dbb13236a7c787e3cb9343a0e66f94287d0dc40dd0b5d29c399eb

    SHA512

    3efb04215a3b5d83c2e4a9b06e3a1dfb7acf2b697897b02a896a234b87fbebbf689b110f7aa8981cd7c09883cbcaf00de4cf74894a67f5d8f5c9081a28ea7120

  • memory/4460-18-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/4460-20-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB

  • memory/4460-24-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/4460-27-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/4892-0-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/4892-1-0x0000000002130000-0x0000000002136000-memory.dmp

    Filesize

    24KB

  • memory/4892-2-0x0000000002130000-0x0000000002136000-memory.dmp

    Filesize

    24KB

  • memory/4892-3-0x0000000002030000-0x0000000002036000-memory.dmp

    Filesize

    24KB

  • memory/4892-17-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB