Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/06/2024, 07:49

General

  • Target

    2024-06-03_ac08ce33eef3f89f0009cd3158082be9_cryptolocker.exe

  • Size

    43KB

  • MD5

    ac08ce33eef3f89f0009cd3158082be9

  • SHA1

    e6a9c715546847271d3898601eda520e6f5ddccd

  • SHA256

    ada65f3f2d392cd24cb2dc2dc126f9cab1e3e443579f262803b34c02c8c9b450

  • SHA512

    4896cd80b84601cd0ee07d3ebd0b7e43c9103b04f4ea938893d8540b98d2dd42874207050caef1fd3f232373534d698b5583e1c62011fa5efeeacd190d66c15b

  • SSDEEP

    768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAH/m:bCDOw9aMDooc+vAfm

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-03_ac08ce33eef3f89f0009cd3158082be9_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-03_ac08ce33eef3f89f0009cd3158082be9_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4820
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    43KB

    MD5

    fabd86b928d663bb748693b3802e0845

    SHA1

    c0e775feb2f36bd486101422b35834d7d1dc8b07

    SHA256

    ca1d9f4cbb8b9b2e0f3aba0b4262c1854e811667d695a7d88a47949e17c6cf36

    SHA512

    c426e2b46973600e3bc4995f52ca19b730ce62030320492845037d6041f3d138ce0674a573680d2b639dca03b18de4179abc651115e3a2e57263570844be29ba

  • memory/684-16-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/684-20-0x0000000001FF0000-0x0000000001FF6000-memory.dmp

    Filesize

    24KB

  • memory/684-26-0x0000000001FC0000-0x0000000001FC6000-memory.dmp

    Filesize

    24KB

  • memory/684-27-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/4820-0-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/4820-1-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/4820-2-0x0000000002060000-0x0000000002066000-memory.dmp

    Filesize

    24KB

  • memory/4820-9-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/4820-18-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB