Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-03_ac08ce33eef3f89f0009cd3158082be9_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-03_ac08ce33eef3f89f0009cd3158082be9_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-06-03_ac08ce33eef3f89f0009cd3158082be9_cryptolocker.exe
-
Size
43KB
-
MD5
ac08ce33eef3f89f0009cd3158082be9
-
SHA1
e6a9c715546847271d3898601eda520e6f5ddccd
-
SHA256
ada65f3f2d392cd24cb2dc2dc126f9cab1e3e443579f262803b34c02c8c9b450
-
SHA512
4896cd80b84601cd0ee07d3ebd0b7e43c9103b04f4ea938893d8540b98d2dd42874207050caef1fd3f232373534d698b5583e1c62011fa5efeeacd190d66c15b
-
SSDEEP
768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAH/m:bCDOw9aMDooc+vAfm
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral2/memory/4820-0-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x0009000000023358-13.dat CryptoLocker_rule2 behavioral2/memory/684-16-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral2/memory/4820-18-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral2/memory/684-27-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 2024-06-03_ac08ce33eef3f89f0009cd3158082be9_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 684 lossy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4820 wrote to memory of 684 4820 2024-06-03_ac08ce33eef3f89f0009cd3158082be9_cryptolocker.exe 84 PID 4820 wrote to memory of 684 4820 2024-06-03_ac08ce33eef3f89f0009cd3158082be9_cryptolocker.exe 84 PID 4820 wrote to memory of 684 4820 2024-06-03_ac08ce33eef3f89f0009cd3158082be9_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-03_ac08ce33eef3f89f0009cd3158082be9_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-03_ac08ce33eef3f89f0009cd3158082be9_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5fabd86b928d663bb748693b3802e0845
SHA1c0e775feb2f36bd486101422b35834d7d1dc8b07
SHA256ca1d9f4cbb8b9b2e0f3aba0b4262c1854e811667d695a7d88a47949e17c6cf36
SHA512c426e2b46973600e3bc4995f52ca19b730ce62030320492845037d6041f3d138ce0674a573680d2b639dca03b18de4179abc651115e3a2e57263570844be29ba