Analysis

  • max time kernel
    133s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    27/05/2024, 21:31

General

  • Target

    2024-05-27_74de511f36fda0caf1abf8ff39baf5ca_cryptolocker.exe

  • Size

    52KB

  • MD5

    74de511f36fda0caf1abf8ff39baf5ca

  • SHA1

    6c3dd60615ed86a81d2891e391681df337e4f29a

  • SHA256

    e1a8b60aba3d87df9481ed85eb465a6da2ff5812e073a76b3d5edb06f2e1062c

  • SHA512

    b03e7c5e18fc902ec6ae519976d9cea7ad4cbc3a36d76b93697dc594e141299e3cdd8b05707ef84793832e62a5c2b10178c0a7a750bcc371e8b7c1a9ccdd2147

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOuv:bODOw9acifAoc+vZ

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-27_74de511f36fda0caf1abf8ff39baf5ca_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-27_74de511f36fda0caf1abf8ff39baf5ca_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:2484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    53KB

    MD5

    b4569b5c22a9f6e0e0d1300f0c11fe0e

    SHA1

    f104ac91e02f0b6d8de4ec06db09fe3040fcdcc9

    SHA256

    bcd127306eee717ea6c3a540d6c1eb7835b7411ec0f8256da9876a57149ddae1

    SHA512

    53ba178cd0c504c5dacd574c777f548f01643d2e5300e7b0354c18c7627f7b308ca385e55499e799b39b485c291c0ab2f9229ce9ec911e43b1c445f6e2b4c04b

  • memory/1684-0-0x0000000008000000-0x000000000800F000-memory.dmp

    Filesize

    60KB

  • memory/1684-1-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1684-2-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/1684-9-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1684-16-0x0000000000770000-0x000000000077F000-memory.dmp

    Filesize

    60KB

  • memory/1684-15-0x0000000008000000-0x000000000800F000-memory.dmp

    Filesize

    60KB

  • memory/1684-27-0x0000000000770000-0x000000000077F000-memory.dmp

    Filesize

    60KB

  • memory/2484-17-0x0000000008000000-0x000000000800F000-memory.dmp

    Filesize

    60KB

  • memory/2484-26-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2484-19-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB

  • memory/2484-28-0x0000000008000000-0x000000000800F000-memory.dmp

    Filesize

    60KB