Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 23:04

General

  • Target

    2024-05-09_579a7aa96d124f6551f723a1dd15ed6a_cryptolocker.exe

  • Size

    41KB

  • MD5

    579a7aa96d124f6551f723a1dd15ed6a

  • SHA1

    26f174bd6a2a15adf5f1523973ca4235e68e0b4a

  • SHA256

    bbb0c330856ad9344d6b90210dfaad83c9f39e29833671fbea6fc162245a6f72

  • SHA512

    272559a4ed52c405a58a01ebd861a0f97be3bba3ffc2bfa805a1908c1d78962afb4c4545029ea45b30d5e17599fe4f2ff7365782f0f44ced0bb1edca4dffde37

  • SSDEEP

    768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAX:bCDOw9aMDooc+vAX

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-09_579a7aa96d124f6551f723a1dd15ed6a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-09_579a7aa96d124f6551f723a1dd15ed6a_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:352
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    41KB

    MD5

    d7eaab17d51f8193e26e3d9ae19916c9

    SHA1

    c3faabb1c8cfa204ed47643df66ef6554aede4a0

    SHA256

    9c205dcf63784ee74b558b273d4911984e3b3c305484d1127f894ad41bea5fff

    SHA512

    b95277bc19a719cad234729ec7644b8f0d866027c5142f7e6919fa3f1757b53965ec0807c3f7e8cc11c78571e120d0538d5c2394f256a8b15c8d37ecb754fe1d

  • memory/352-0-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/352-1-0x00000000020C0000-0x00000000020C6000-memory.dmp

    Filesize

    24KB

  • memory/352-2-0x00000000020E0000-0x00000000020E6000-memory.dmp

    Filesize

    24KB

  • memory/352-8-0x00000000020C0000-0x00000000020C6000-memory.dmp

    Filesize

    24KB

  • memory/352-16-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/952-19-0x0000000000510000-0x0000000000516000-memory.dmp

    Filesize

    24KB

  • memory/952-25-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/952-26-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB