Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    21/05/2024, 15:42

General

  • Target

    2024-05-21_449674d25fbe61bf585eb6f55d89e35d_cryptolocker.exe

  • Size

    52KB

  • MD5

    449674d25fbe61bf585eb6f55d89e35d

  • SHA1

    8900bdf30389cec640bf509d0612127aca686c42

  • SHA256

    770a3f28cdc9197e7b4370fa83f82255ce30c7602bb0ee8aa3204e65dbd08f41

  • SHA512

    3b98a2314fb22ce77b3741710f8dcc6f257b5788a5d2fa5ca9b6cb3a318a7615408dc7686152cd599c45d8832da8241fd1df07be3bfe24804476996198ea67c3

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOq:bODOw9acifAoc+vF

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-21_449674d25fbe61bf585eb6f55d89e35d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-21_449674d25fbe61bf585eb6f55d89e35d_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:1696

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\lossy.exe

          Filesize

          52KB

          MD5

          bb36f721a6d5ddb6acb58e4093a065c8

          SHA1

          aece26c409c4dd21a3f2d52386cdfa3c62d06f85

          SHA256

          53e9b6d52929328830a6794675cf1720cf764f312f16638c5325e93c9f826e8d

          SHA512

          5099b7461e48336ee707b3f6bf41cb1430ac94679c8c0e4e2ca379f04f4c1237891e74f4814f37b08858276e5bb07dc3fe4ba55bde3bf97f3fca2c20194307f9

        • memory/1696-16-0x0000000008000000-0x000000000800F000-memory.dmp

          Filesize

          60KB

        • memory/1696-18-0x0000000001C90000-0x0000000001C96000-memory.dmp

          Filesize

          24KB

        • memory/1696-25-0x0000000000320000-0x0000000000326000-memory.dmp

          Filesize

          24KB

        • memory/1696-26-0x0000000008000000-0x000000000800F000-memory.dmp

          Filesize

          60KB

        • memory/2620-0-0x0000000008000000-0x000000000800F000-memory.dmp

          Filesize

          60KB

        • memory/2620-2-0x0000000000560000-0x0000000000566000-memory.dmp

          Filesize

          24KB

        • memory/2620-9-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2620-1-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/2620-15-0x0000000008000000-0x000000000800F000-memory.dmp

          Filesize

          60KB