Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    09-04-2024 04:08

General

  • Target

    2024-04-09_97e2864b805616a866a84bb0ac75116a_cryptolocker.exe

  • Size

    54KB

  • MD5

    97e2864b805616a866a84bb0ac75116a

  • SHA1

    5f8188759f790a469602beb6a4dd563fe1b31c42

  • SHA256

    a9c8b886965a85260e5ecb24dda9adc2f9bacc5e09aeaa4b432d8273cbad5c42

  • SHA512

    c012068c3dba5b6ef9a88a6c110b8b2dfa10d0f5fbd046ac2f13e964f47beb3d06858858df03f45933fe5b9c7efe9be77323d95b18daeb2e08b9f6d2e5a2914f

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4ICNBCXK9Xv+mb6uXvMjCzK:bIDOw9a0DwitDZzc167j8K

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-09_97e2864b805616a866a84bb0ac75116a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-09_97e2864b805616a866a84bb0ac75116a_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:1800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    54KB

    MD5

    dcfa8b584b37e3b3d39fae077b265b85

    SHA1

    ec59e47c6938bf279dee3ed442e800f7a61d5d48

    SHA256

    d250b9beb8fc497b97632943b5255bdbbfe9a3264edfc88baa10733dd846a9c3

    SHA512

    050c7b5903018acc7fe96376517b337dab0dd36a413375e0cbe3a73b6421e31f60ba75f4314c7c224c5c83b5da70e0c5937830be9e1dbedcb1a215f02e00b4f1

  • memory/1800-15-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/1800-17-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2236-0-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/2236-2-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/2236-1-0x0000000000550000-0x0000000000556000-memory.dmp

    Filesize

    24KB