Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/06/2024, 12:52

General

  • Target

    2024-06-10_e5624f5759a69f2bec0a686a409f1ece_cryptolocker.exe

  • Size

    53KB

  • MD5

    e5624f5759a69f2bec0a686a409f1ece

  • SHA1

    85d4e68f9a1ab2d0cbcd56a45dfdd067ca60f5b7

  • SHA256

    6090f5de8c4152661f0fc8a57c1fb006512641b454830db9672cfc1b3ac6f0f7

  • SHA512

    45ed092a957901421a102b83a0c08d4f4727d3eff15a48ff232c6c81475b2324cc95b761e8f7679e8975fe310980b5ef2c60aeb785ae97c77a94b8661046a4ac

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOm:bODOw9acifAoc+vx

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-10_e5624f5759a69f2bec0a686a409f1ece_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-10_e5624f5759a69f2bec0a686a409f1ece_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:2484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    53KB

    MD5

    2b3190fedba577d80db1be8041b15540

    SHA1

    aba0074f39621c932827c6c70724cd22c68b79bf

    SHA256

    8f78d21af945a3460a3f9eac47bcc6d30069710b840d49ce7ad474cd926b3560

    SHA512

    a67d42c697f696790b70b953567124c3c9fb20bdae5ab30dc25b1c80e4c72cbf97e71767c08d0fb1c79e98ca750bedcd31baf372426957cc6142f2e9d8e5e812

  • memory/2484-17-0x0000000008000000-0x000000000800F000-memory.dmp

    Filesize

    60KB

  • memory/2484-20-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/2484-26-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/2484-27-0x0000000008000000-0x000000000800F000-memory.dmp

    Filesize

    60KB

  • memory/3444-0-0x0000000008000000-0x000000000800F000-memory.dmp

    Filesize

    60KB

  • memory/3444-1-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/3444-9-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/3444-2-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/3444-18-0x0000000008000000-0x000000000800F000-memory.dmp

    Filesize

    60KB