Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/09/2024, 09:51

General

  • Target

    2024-09-05_692a3c15c04c05a868d96ee3b3d77a4a_cryptolocker.exe

  • Size

    52KB

  • MD5

    692a3c15c04c05a868d96ee3b3d77a4a

  • SHA1

    1a8c00aec35eaad4af0983c3b6bdaac038f7bae4

  • SHA256

    9fd93ff23c439e507a8378ff46a48f716448a0594e31e168ba4805073922c299

  • SHA512

    3c09d445af2215c8e1f116377f9a12d542a9989fdacbbc78595a5fb7333a5b887df0d81ebb634e6dca2f96a7d5a8dc8a0456b07df3ed0769c08a21fe66b16938

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtX/:bODOw9acifAoc+vX/

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-05_692a3c15c04c05a868d96ee3b3d77a4a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-05_692a3c15c04c05a868d96ee3b3d77a4a_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3244
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    52KB

    MD5

    62a6f74515070126bd4c9937e87a7caf

    SHA1

    13b8555c71c0de9e2ad562fcd5fe9df6e6e73593

    SHA256

    55de94f514ce3883d11ab3cba8256e24400fd4228c0d265f03e89e97fcb3faa2

    SHA512

    ef7101e2b52cdfa1f3d624a190740bde7aef66464176ca869c3d0b61ef26b96e72be9b55d905995f17ac97bb2d07a38555ccf73151bb72bb0c6c8808124d2041

  • memory/2264-19-0x00000000021D0000-0x00000000021D6000-memory.dmp

    Filesize

    24KB

  • memory/2264-20-0x00000000020F0000-0x00000000020F6000-memory.dmp

    Filesize

    24KB

  • memory/2264-26-0x0000000008000000-0x000000000800F000-memory.dmp

    Filesize

    60KB

  • memory/3244-0-0x0000000008000000-0x000000000800F000-memory.dmp

    Filesize

    60KB

  • memory/3244-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3244-2-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3244-3-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/3244-17-0x0000000008000000-0x000000000800F000-memory.dmp

    Filesize

    60KB