Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 04:32
Behavioral task
behavioral1
Sample
2024-05-11_2de2019d3d7805cf528f5565a811a4f6_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-11_2de2019d3d7805cf528f5565a811a4f6_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-11_2de2019d3d7805cf528f5565a811a4f6_cryptolocker.exe
-
Size
51KB
-
MD5
2de2019d3d7805cf528f5565a811a4f6
-
SHA1
63e44427207e758473af6076fd04730b4a812f6c
-
SHA256
213df90556135d18175352758ea6f343d6b7704f186f69b79de22cb149525535
-
SHA512
64725f6b88052cf4c5e8c40be9760b1d136a53e2a2c056c39b427bda66ac1363efbd5fae39420875d0ea8d830a7e92c245fc4abffa6c403ceab06ec2de170bad
-
SSDEEP
768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtO1:bODOw9acifAoc+vi
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral2/memory/1524-0-0x0000000008000000-0x000000000800F000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x000a0000000233c0-13.dat CryptoLocker_rule2 behavioral2/memory/1524-17-0x0000000008000000-0x000000000800F000-memory.dmp CryptoLocker_rule2 behavioral2/memory/4160-18-0x0000000008000000-0x000000000800F000-memory.dmp CryptoLocker_rule2 behavioral2/memory/4160-27-0x0000000008000000-0x000000000800F000-memory.dmp CryptoLocker_rule2 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral2/memory/1524-0-0x0000000008000000-0x000000000800F000-memory.dmp UPX behavioral2/files/0x000a0000000233c0-13.dat UPX behavioral2/memory/1524-17-0x0000000008000000-0x000000000800F000-memory.dmp UPX behavioral2/memory/4160-18-0x0000000008000000-0x000000000800F000-memory.dmp UPX behavioral2/memory/4160-27-0x0000000008000000-0x000000000800F000-memory.dmp UPX -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 2024-05-11_2de2019d3d7805cf528f5565a811a4f6_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4160 lossy.exe -
resource yara_rule behavioral2/memory/1524-0-0x0000000008000000-0x000000000800F000-memory.dmp upx behavioral2/files/0x000a0000000233c0-13.dat upx behavioral2/memory/1524-17-0x0000000008000000-0x000000000800F000-memory.dmp upx behavioral2/memory/4160-18-0x0000000008000000-0x000000000800F000-memory.dmp upx behavioral2/memory/4160-27-0x0000000008000000-0x000000000800F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1524 wrote to memory of 4160 1524 2024-05-11_2de2019d3d7805cf528f5565a811a4f6_cryptolocker.exe 82 PID 1524 wrote to memory of 4160 1524 2024-05-11_2de2019d3d7805cf528f5565a811a4f6_cryptolocker.exe 82 PID 1524 wrote to memory of 4160 1524 2024-05-11_2de2019d3d7805cf528f5565a811a4f6_cryptolocker.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-11_2de2019d3d7805cf528f5565a811a4f6_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-11_2de2019d3d7805cf528f5565a811a4f6_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:4160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5db6b3255b42519d2bd0aa8ccf8d02cb2
SHA166f5ad0179c0c202588e2ac1fb4fdc68d99f70c6
SHA25607aeae0b95a34000b410bcecdedfbbf04652602df2c427cf76d410de12b1ee90
SHA512e40232868f9cd12a28abb81dd287828dc03580baa374ed71907b8468b3f62be30670dc1940f64d1a6dba62a36a2f42849757d533a0e1f37efd2e9eed0eb1ee1f