Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/06/2024, 21:34

General

  • Target

    2024-06-10_751aaa2c602832706dcbb05e6df949b6_cryptolocker.exe

  • Size

    45KB

  • MD5

    751aaa2c602832706dcbb05e6df949b6

  • SHA1

    6fc2eccbca870ceb695b6f77fc25ae6254804f8e

  • SHA256

    c779c376a03af60dad1c208d59418b79a069c131180add43ca9d90db4ca72c4a

  • SHA512

    3c9fb905ef24bc1a6a6025654c95d3e444d6c8e06d0347873fe8551983bfcad4cb9c25302ffc5de4353ff216a008c1fc9f9d0c55ba0eea799fa424414b58e194

  • SSDEEP

    768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAIie0LHuP:bCDOw9aMDooc+vAlXE

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-10_751aaa2c602832706dcbb05e6df949b6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-10_751aaa2c602832706dcbb05e6df949b6_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:2236

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\lossy.exe

          Filesize

          45KB

          MD5

          6c01c81288a81cd214d9d8be115ca679

          SHA1

          c8706e64c6240a05aadd5a069ad7fc9af960dc5c

          SHA256

          3bc1d076d796840e0bd2da5dd4c6931ad670b2cdfa18f2c67717cf9e71bc59dd

          SHA512

          8869389c4b8e39c6d9af69418b6923d60ce7581c4ce1ce67c5440b728fdbff8c7d642f15964efd8a610db1322a8863f14573fb7496b1a19d30074b30a50dd3df

        • memory/2236-18-0x0000000000560000-0x0000000000566000-memory.dmp

          Filesize

          24KB

        • memory/2236-25-0x0000000000520000-0x0000000000526000-memory.dmp

          Filesize

          24KB

        • memory/2236-26-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB

        • memory/2792-0-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB

        • memory/2792-1-0x0000000000280000-0x0000000000286000-memory.dmp

          Filesize

          24KB

        • memory/2792-2-0x0000000000280000-0x0000000000286000-memory.dmp

          Filesize

          24KB

        • memory/2792-3-0x0000000000350000-0x0000000000356000-memory.dmp

          Filesize

          24KB

        • memory/2792-16-0x0000000008000000-0x000000000800A000-memory.dmp

          Filesize

          40KB

        • memory/2792-14-0x0000000002BB0000-0x0000000002BBA000-memory.dmp

          Filesize

          40KB