Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
20240414655498227a7a9cffcfd9a28d9aa53da8cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
20240414655498227a7a9cffcfd9a28d9aa53da8cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
20240414655498227a7a9cffcfd9a28d9aa53da8cryptolocker.exe
-
Size
53KB
-
MD5
655498227a7a9cffcfd9a28d9aa53da8
-
SHA1
6a6ce09ce6d79efb7b9e95b40c2340f0f88ce284
-
SHA256
41fef86cf1b576112ac71db00c5d12a18bdc159cb31f3d6e7a5c336320690352
-
SHA512
428ab4df4ca514a058a5614ff2e35990daf55c68775845215ecf684f124022a3a786b03bebd3e53a2cf659fbd9ad34588bd08404081cf889642a5f9612d79bc5
-
SSDEEP
768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4ICNBCXK9XbTb8puq:bIDOw9a0DwitDZzcTLq
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation 20240414655498227a7a9cffcfd9a28d9aa53da8cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 5052 lossy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5008 wrote to memory of 5052 5008 20240414655498227a7a9cffcfd9a28d9aa53da8cryptolocker.exe 85 PID 5008 wrote to memory of 5052 5008 20240414655498227a7a9cffcfd9a28d9aa53da8cryptolocker.exe 85 PID 5008 wrote to memory of 5052 5008 20240414655498227a7a9cffcfd9a28d9aa53da8cryptolocker.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240414655498227a7a9cffcfd9a28d9aa53da8cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\20240414655498227a7a9cffcfd9a28d9aa53da8cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:5052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD53f7eebe1ea020909cb0655bca067e397
SHA14afd7cbbb5ffdf6fe34aacb3a46af09bdf87e53d
SHA2566caee73999a03ddfd182f42273314d98c9896d5d40d5bd39d2b79d8944ba9fb1
SHA5126d493724b3e1b34fcc679bf3de80bbbaecd11a800ab298dee92ad2be2e6ab3431a9a5f0152be96f601723a4403014e51a4d538fd81d88922ee4a114c6bfda7a3