Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    15/04/2024, 17:33

General

  • Target

    20240414840cf46c37bc8790f1ff860788c02b1dcryptolocker.exe

  • Size

    41KB

  • MD5

    840cf46c37bc8790f1ff860788c02b1d

  • SHA1

    409bc621b7f9dfa740b2dfc90c679f1b70812376

  • SHA256

    bd443f2ded16c6d5eaa28b7e8dd7a90fcc5e48151307a4da1208cfa95b7e7085

  • SHA512

    644961e4606f8f47fd1ddd927bac6e0f23d58551c654600b88fe27bf5c6cda75f6848e4574529d3a2f6b5c257d27901d5ff48043b1d5b9c70383ae882e4698bd

  • SSDEEP

    768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAHl:bCDOw9aMDooc+vAF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20240414840cf46c37bc8790f1ff860788c02b1dcryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\20240414840cf46c37bc8790f1ff860788c02b1dcryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:2204

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\lossy.exe

          Filesize

          41KB

          MD5

          1dad629340de42f046d05a27a6fe2c77

          SHA1

          e6e1d269e097e257a013e77a064d6052a83b0062

          SHA256

          4e88c5bc2ea1b044843862207f11f594df376cd8577588ca292769702a62d25b

          SHA512

          63b37ec3d55501c839622ba40b2a0e976dbf06f802654bfc7562c4e592735363b5695e077e0811065c747dd05767c5ad5073312d2a6e854765d64e54747ab35e

        • memory/2004-0-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB

        • memory/2004-2-0x0000000000270000-0x0000000000276000-memory.dmp

          Filesize

          24KB

        • memory/2004-1-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2004-3-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2004-15-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB

        • memory/2204-16-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB

        • memory/2204-18-0x0000000000300000-0x0000000000306000-memory.dmp

          Filesize

          24KB

        • memory/2204-25-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB