Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2024, 16:46

General

  • Target

    2024-03-29_53ab237d2ab022b009cc768702ee4c74_cryptolocker.exe

  • Size

    40KB

  • MD5

    53ab237d2ab022b009cc768702ee4c74

  • SHA1

    ee1c07c93f54c864ca108459e6d950b1b704f4df

  • SHA256

    f0b0b72b7127a8b92cffefb8bee6b2e0fc574ff4265eb18822f4b744659a1136

  • SHA512

    e596394fb3d7a07b4f0c91160d9f6bcf76b27fd89327909959ae838ab5f2a5d657bc732c767d06197290e6ef343a9445b788e4c018185a4a6b31d2ca0f90dbf1

  • SSDEEP

    768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAId:bCDOw9aMDooc+vAw

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-29_53ab237d2ab022b009cc768702ee4c74_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-29_53ab237d2ab022b009cc768702ee4c74_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:1736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    40KB

    MD5

    b9af81c9e4bf8f7b5c9bc8d046aa8f75

    SHA1

    cd0f0426c1e77202ee13bfdcfa12e2485007883d

    SHA256

    6a5c55be1e98712c8d8937da61f333560ff5b3e481b05baf686479c94b932800

    SHA512

    9bdfb1099da33488e0103a7572a0ceb0662314a0f49b08433e8fd2d9f4f9747a8243511eb24b1efc9636d3cfcde7f80a317ebe7f813f67c8cc06e115ca50deb2

  • memory/1736-18-0x0000000000590000-0x0000000000596000-memory.dmp

    Filesize

    24KB

  • memory/1736-17-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/1736-20-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/1736-26-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/2372-0-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/2372-1-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2372-3-0x0000000000370000-0x0000000000376000-memory.dmp

    Filesize

    24KB

  • memory/2372-2-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2372-15-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB