Analysis
-
max time kernel
83s -
max time network
84s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-26_a03e40f68e8c0cc7ccf006db3db649e4_cryptolocker.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-07-26_a03e40f68e8c0cc7ccf006db3db649e4_cryptolocker.exe
Resource
win10v2004-20240709-en
Errors
General
-
Target
2024-07-26_a03e40f68e8c0cc7ccf006db3db649e4_cryptolocker.exe
-
Size
5.5MB
-
MD5
a03e40f68e8c0cc7ccf006db3db649e4
-
SHA1
8d681614af983c2e5e590e65035f139139665bb6
-
SHA256
930556536142c3fc94dcf6f2fd391c53cadbaeaeb456ed169decfab0a43be7b1
-
SHA512
8bb26b76393cbd9c01225f47e103e7f5fa78930e9c63c251b302a265e9625b3757b1c0bdedce5b800b6ed7fcb6f308dc8f85569e77f13a5bafc6dc7c4a4021e8
-
SSDEEP
98304:ot1QKvyjzO6B3DenIMmzyxD++XsBq+JUieGNt3sB/a1Ed9m+Ufl:otTvgz73XMpxDbcwYvt3sFa4Ol
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2096 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 3044 2024-07-26_a03e40f68e8c0cc7ccf006db3db649e4_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-07-26_a03e40f68e8c0cc7ccf006db3db649e4_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lossy.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3044 2024-07-26_a03e40f68e8c0cc7ccf006db3db649e4_cryptolocker.exe 2096 lossy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2096 3044 2024-07-26_a03e40f68e8c0cc7ccf006db3db649e4_cryptolocker.exe 30 PID 3044 wrote to memory of 2096 3044 2024-07-26_a03e40f68e8c0cc7ccf006db3db649e4_cryptolocker.exe 30 PID 3044 wrote to memory of 2096 3044 2024-07-26_a03e40f68e8c0cc7ccf006db3db649e4_cryptolocker.exe 30 PID 3044 wrote to memory of 2096 3044 2024-07-26_a03e40f68e8c0cc7ccf006db3db649e4_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-26_a03e40f68e8c0cc7ccf006db3db649e4_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-26_a03e40f68e8c0cc7ccf006db3db649e4_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD5bca642f20c202d325c5f86bf9a7483bf
SHA1ef9170652ac3a6142bc48858cd8a2964924249c7
SHA25659271f08d11897766fa342e3a54d8aa8c0f6be99824f0099ae16262654d69ef4
SHA5125279595265bee57f44fbd19e33bac9e8f410f4d9cdbbea55013369392c47f179db5bcf1e7ad90ddc6457073e22dfee0f5925cab15b6c006333d3f001d5c6e1fb