Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    02-05-2024 00:55

General

  • Target

    2024-05-02_8706cb78f7afbbea76258935f5cb8b5e_cryptolocker.exe

  • Size

    41KB

  • MD5

    8706cb78f7afbbea76258935f5cb8b5e

  • SHA1

    d1965545b9f43dd322ba7a5a7c915420b499fce5

  • SHA256

    9ef300a10241eed1c6f0c875467fae2254fb2f14568b8fe71261646481a2135b

  • SHA512

    85e3949b019fa33c4a329a2aef62b020b718e56af079d785ff9a318428dd27f857bd01fdf5b1f805a06e527bb9cf859303403b99a33200a0c48cfd6c08060f65

  • SSDEEP

    768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAU:bCDOw9aMDooc+vAU

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-02_8706cb78f7afbbea76258935f5cb8b5e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-02_8706cb78f7afbbea76258935f5cb8b5e_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    41KB

    MD5

    a7e7338bc8c2f636666d3687f5bfaf4f

    SHA1

    b75e739a6242458a9964d12d6f0bfdae06412140

    SHA256

    ec982a3871fb17639886d98677f3a9ad10ca671c1d9933a6036e9ea2e2090b86

    SHA512

    d1f4d1e1e4ce272f16b1fcc779548daa2adb97e529cdfbdf6d7f942fc0b09eec8fc214d63ca303508c7f3785b274b7c0b1df4c76923dea5686f205508e7be4e1

  • memory/1760-0-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/1760-1-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/1760-2-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/1760-3-0x0000000000560000-0x0000000000566000-memory.dmp

    Filesize

    24KB

  • memory/1760-13-0x0000000001F00000-0x0000000001F0A000-memory.dmp

    Filesize

    40KB

  • memory/1760-16-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/2760-18-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/2760-25-0x0000000000440000-0x0000000000446000-memory.dmp

    Filesize

    24KB

  • memory/2760-26-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB