Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 23:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-27_601fed67897376a58f842a1c4bc5b21c_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-27_601fed67897376a58f842a1c4bc5b21c_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-27_601fed67897376a58f842a1c4bc5b21c_cryptolocker.exe
-
Size
43KB
-
MD5
601fed67897376a58f842a1c4bc5b21c
-
SHA1
42a2a36ac66e2f92fa9277d4e9dee0f7849c8013
-
SHA256
5c429dcb2ed19b04b38bd52b37631d7e21fe9aa7cd17dff536c4b9eace2165cf
-
SHA512
e6d57889f385feb4838e8083743dea0253841fba656f8af7defed1597b37345ca91edc161bcfa636485bc9a8f7ec8bd78f9e729d6cca88fbb2cec2fdea377302
-
SSDEEP
768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAH/H:bCDOw9aMDooc+vAfH
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral2/memory/1084-0-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x0007000000023297-13.dat CryptoLocker_rule2 behavioral2/memory/1084-18-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral2/memory/3400-17-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral2/memory/3400-27-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 2024-05-27_601fed67897376a58f842a1c4bc5b21c_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3400 lossy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1084 wrote to memory of 3400 1084 2024-05-27_601fed67897376a58f842a1c4bc5b21c_cryptolocker.exe 81 PID 1084 wrote to memory of 3400 1084 2024-05-27_601fed67897376a58f842a1c4bc5b21c_cryptolocker.exe 81 PID 1084 wrote to memory of 3400 1084 2024-05-27_601fed67897376a58f842a1c4bc5b21c_cryptolocker.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-27_601fed67897376a58f842a1c4bc5b21c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-27_601fed67897376a58f842a1c4bc5b21c_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:3400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD52daefe8f0c89203588330d8a58049c7d
SHA1f212c161d5323f08a873fe0317042912795f0694
SHA2562633f2c2c1c1087228ec7733a2807d535388fd372e6db744cbff2d3fe5b1c4ca
SHA51210c2564d944e366939476157f77043a91fe98edc5c15758114a8808e97106f9812206c3c948c408b3843e318d2715a6fd1090b8c9583e515351ebf88f10ad03e