Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2024, 22:24

General

  • Target

    2024-05-11_456c068dfa4bb45281b2f36f7d220fef_cryptolocker.exe

  • Size

    41KB

  • MD5

    456c068dfa4bb45281b2f36f7d220fef

  • SHA1

    52385812d127a7ab1846a82226bb5fbb19acea7c

  • SHA256

    99fbcfd3259b6561654df38d248184497474f4368c232df864212543ed795444

  • SHA512

    0dc6e3dea2b52935d3a3e44ef3072ed98d8625c347363e77bdb8746906b32b6ef6f2025bd8dbf6684c8d0b989c84ba9d2313bd3589d536f01ca8eceb1f845eef

  • SSDEEP

    768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAdQ:bCDOw9aMDooc+vAe

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-11_456c068dfa4bb45281b2f36f7d220fef_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-11_456c068dfa4bb45281b2f36f7d220fef_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:292

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\lossy.exe

          Filesize

          41KB

          MD5

          69bff9d7a370ea160e52125d7c176237

          SHA1

          c86ae9005f10d42d2e54a870998e600a2c544f31

          SHA256

          43a6f3ae0ab801b5ed6c4c46176c2920eeeb76510035f271441534ccbabe1ac2

          SHA512

          e0b3eb9c6e9b36f1baa4252a7dd308789ea710c9718a7febda2447aaa1258fae8a408519bb1086d5107c57d8ffa6e16b1362ae64cf12f09dd444fdabdbada0ea

        • memory/292-16-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB

        • memory/292-18-0x0000000000280000-0x0000000000286000-memory.dmp

          Filesize

          24KB

        • memory/292-25-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB

        • memory/2416-0-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB

        • memory/2416-1-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2416-2-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2416-3-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB

        • memory/2416-15-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB