Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    05-06-2024 03:48

General

  • Target

    2024-06-05_b651ef1ef061dad875832062d418e317_cryptolocker.exe

  • Size

    50KB

  • MD5

    b651ef1ef061dad875832062d418e317

  • SHA1

    1a93de8682ded86d6937050c7b2734f40f3bd214

  • SHA256

    ffb3ed8fb0229e1e211e4092d5d5087941e7bea126ebe30560e0fa582fc077f7

  • SHA512

    5ffebb5528f28041f1567fc0bc0a4c3d590c163425952d54d907d1fbef8d2f9624a791f86f70fa3c08140f58e9383f581829fbac21c0e32d27875627cdd1bf98

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6D8jnPx9UnuDLlD+JIr:bIDOw9a0Dwo3P1ojvUSD4PInyDk8

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-05_b651ef1ef061dad875832062d418e317_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-05_b651ef1ef061dad875832062d418e317_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    50KB

    MD5

    9e5364e7bf828a08549a61dbea4fd820

    SHA1

    de3fdd8128276d9897dcb0d638d3aafde987560a

    SHA256

    5984c3de640c997a8ec32e0692ac3be2206d602c0c26a6f7c79d88f5fb5ce5a1

    SHA512

    ce89952d801ed90753b40a9116c8a5ba73f993b9b13e2f3a7546308c98783e161a6d1790a7f2766d64c85964ac33a344c7e412cc063ddd09c228fbafc8a9bacb

  • memory/2572-15-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2784-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2784-1-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/2784-8-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB