Analysis

  • max time kernel
    0s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    05/06/2024, 03:51

General

  • Target

    2024-06-05_d100d2161c915989f59ff9b0c4106290_cryptolocker.exe

  • Size

    52KB

  • MD5

    d100d2161c915989f59ff9b0c4106290

  • SHA1

    4a0f7dacf55e36199ca3b16d525cd1bdb512e7d8

  • SHA256

    c4dbd85641159159831006714fd004d6b9db4c1bd4be1b84679cf6501725e978

  • SHA512

    dc8509416f13eb6ffb6e8dbd804a2bb5c366c71b841b5851f435eb3a5f71e79d81444f3571149225c27d34691fa99f59c8468bde7dd1ded6be8019986b4d24be

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOe:bODOw9acifAoc+vx

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • UPX dump on OEP (original entry point) 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-05_d100d2161c915989f59ff9b0c4106290_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-05_d100d2161c915989f59ff9b0c4106290_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    53KB

    MD5

    8e9f497fbb3272df3bb08d55a12c6dbd

    SHA1

    090168b57eac1316f106de009a9a1207939b464d

    SHA256

    0cf6342b3e7dd9c88a3916795898554f0f7dc4429c60360cead0cdaec189a250

    SHA512

    d6f42fa4b735688a9a5a13a61646b5e6faa9eaa4acc97b25f30835e34f3aaf54415e735f8d89cbcd1c261c264dee808b1647ca2585419ac32543598e9ca856b3

  • memory/2180-9-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2180-8-0x0000000008000000-0x000000000800F000-memory.dmp

    Filesize

    60KB

  • memory/2180-1-0x0000000000210000-0x0000000000216000-memory.dmp

    Filesize

    24KB

  • memory/2180-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2612-24-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2612-17-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB

  • memory/2612-15-0x0000000008000000-0x000000000800F000-memory.dmp

    Filesize

    60KB

  • memory/2612-25-0x0000000008000000-0x000000000800F000-memory.dmp

    Filesize

    60KB