Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 12:30

General

  • Target

    2024-09-05_541648950ee96a67bba87cf544f3cb16_cryptolocker.exe

  • Size

    43KB

  • MD5

    541648950ee96a67bba87cf544f3cb16

  • SHA1

    d350e1fdd0693906ceb6571af63f8047becf5655

  • SHA256

    14213dbade7155992b7160d3d82c68aeb54d541905b7194407e2d3296f8806a4

  • SHA512

    09dd10c8421784fcb96df7198c90669a599b35cfd58dec7dd389161c9973b517f204940b833463b83c8e4dc2dfdec8696345fe908c54cdf2d63dc32c8c5b62f5

  • SSDEEP

    768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAGa:bCDOw9aMDooc+vAGa

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-05_541648950ee96a67bba87cf544f3cb16_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-05_541648950ee96a67bba87cf544f3cb16_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    43KB

    MD5

    94c085c85573359f4ae09f762df9b04e

    SHA1

    4c7875e35b08a77c1d7c71ca98762e63d4cd39f9

    SHA256

    533441d499402ea085846cc18eae37430492ee54b1dfae2e2623ae51a9f97c9c

    SHA512

    5d84f702c0f6a3b8684e222810873f304c0aee226dc51636a2f82848be39274357fd3014e8b77e3cb1c86ed7b69e8b2e382834b9f1a43fad51158f3ff30fbaaf

  • memory/2784-0-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/2784-1-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2784-2-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2784-3-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2784-15-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/2944-24-0x00000000002D0000-0x00000000002D6000-memory.dmp

    Filesize

    24KB

  • memory/2944-17-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/2944-25-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB