Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 15:30

General

  • Target

    2024-05-10_6f9f15387c0e6f54c9ab3364bf8874a6_cryptolocker.exe

  • Size

    41KB

  • MD5

    6f9f15387c0e6f54c9ab3364bf8874a6

  • SHA1

    9b3cd7d3536f7bb7d8bc4fb5d01f88478d916a08

  • SHA256

    6cb9e5de11af59438cdfae64b79fb5ab5bbfd4d95916f931bc4fa92e04edf4f2

  • SHA512

    ac50f54f0eec0fa740c7e0b37482aa365bf6cb7e7879ab76ea7302498ba5cdc52f631ae8a3aa513efa1c514c466c131ca205882d7e47781be41cf6045996dd54

  • SSDEEP

    768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAA:bCDOw9aMDooc+vAA

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-10_6f9f15387c0e6f54c9ab3364bf8874a6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-10_6f9f15387c0e6f54c9ab3364bf8874a6_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:3432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    42KB

    MD5

    7239321ccf60e0d86eb2f1fc557fdf68

    SHA1

    9c8be827c366d71409548c99e31b95fa0b5f1e50

    SHA256

    472a3856bb2e48cca9ec1fca098028533d57656682cac5008e7e4e5b74ce0825

    SHA512

    2654edd14567e5551f5f01d140a20c66db1468a01bd39c07d80c0aff78057ca072ef5e0c1910dcebd8cf7b8b79be04052a3c9165f1f8f4feb8cb367440fc8061

  • memory/2560-0-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/2560-1-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/2560-3-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB

  • memory/2560-2-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/2560-18-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/3432-16-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/3432-26-0x0000000001F40000-0x0000000001F46000-memory.dmp

    Filesize

    24KB

  • memory/3432-20-0x0000000001F60000-0x0000000001F66000-memory.dmp

    Filesize

    24KB

  • memory/3432-27-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB