Analysis

  • max time kernel
    152s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/06/2024, 16:56

General

  • Target

    2024-06-04_28d94611df78fbc97792c4e2f8bf9f13_cryptolocker.exe

  • Size

    50KB

  • MD5

    28d94611df78fbc97792c4e2f8bf9f13

  • SHA1

    ac9fa84bbcf400e517546d1c01cc01f426109c90

  • SHA256

    b09ecd674dade54e2e14188d3101be83e7687f73de041f0b14fa583c1aa5ebbd

  • SHA512

    37ddbbec565170dc57e18543b9bde4b0515738f2fd84c7cb108525b437328979122964d8c73e480cd3d0a2f77205ef7e31ef118db81e9fb1c0dd0647778ab639

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6D8jnPx9UnuDLlD+JIP:bIDOw9a0Dwo3P1ojvUSD4PInyDkY

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-04_28d94611df78fbc97792c4e2f8bf9f13_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-04_28d94611df78fbc97792c4e2f8bf9f13_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4300
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:1456
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3976 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2232

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\lossy.exe

            Filesize

            50KB

            MD5

            5c82ca35a9e4f902002a1e6b2379aab9

            SHA1

            d098dec9a1f9e513a6c017666765dde75f0edca8

            SHA256

            4693c89506149b636897fcc631dd34615e7f2ee51ef74fe1370bafe61bc5f5e5

            SHA512

            d17f6fbc16b17f2986fe6cf05e587c8208e0952c0e6a0a16866b8d790e63d454bfd90d031e3dd11679df0259427db27e2a7d0924d3000de0f6adb5f8530354eb

          • memory/1456-17-0x0000000002130000-0x0000000002136000-memory.dmp

            Filesize

            24KB

          • memory/1456-18-0x0000000002030000-0x0000000002036000-memory.dmp

            Filesize

            24KB

          • memory/4300-0-0x0000000002310000-0x0000000002316000-memory.dmp

            Filesize

            24KB

          • memory/4300-1-0x0000000002310000-0x0000000002316000-memory.dmp

            Filesize

            24KB

          • memory/4300-2-0x0000000002230000-0x0000000002236000-memory.dmp

            Filesize

            24KB