Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/05/2024, 00:46

General

  • Target

    2024-05-27_d60dbb2097f72a1a124b9bc77e20f06c_cryptolocker.exe

  • Size

    56KB

  • MD5

    d60dbb2097f72a1a124b9bc77e20f06c

  • SHA1

    7f1abb1a95fba937329586dde150134d1f97d984

  • SHA256

    4ae897db68f0eedba2c582e328b535594ca9c66babb13c826a23425b18312575

  • SHA512

    a0382a5363b5760427e36da8af70e67dd8af8b6cac2fb371925753d5ea68de15c4466263e2c69f8f61106741813adc5756182ac05bd108bf987aee6d56278dea

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4ICNBCXK9XbTb8puG:bIDOw9a0DwitDZzcTLG

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-27_d60dbb2097f72a1a124b9bc77e20f06c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-27_d60dbb2097f72a1a124b9bc77e20f06c_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:3008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    56KB

    MD5

    d961e29fe5b75502bf9cf6fe04bd129c

    SHA1

    8a4c74a7134bee580a09aec346de300b034e1aab

    SHA256

    4fdac34813b48e2b569492f6751801cd77a8949457fbf971b6ecd63d8d838c93

    SHA512

    2b7c13c14b48933bb4db5742885097ad446aa0b3c47553d733b4f15c19c9a042d28ff530a2f184c2dd020d8a9785638bec0e1da7fec3bb42af577206f36896b2

  • memory/1728-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1728-8-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1728-1-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/3008-15-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/3008-22-0x0000000000440000-0x0000000000446000-memory.dmp

    Filesize

    24KB