Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_731e90c74813b81dca2991deda78f4a2_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-19_731e90c74813b81dca2991deda78f4a2_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_731e90c74813b81dca2991deda78f4a2_cryptolocker.exe
-
Size
45KB
-
MD5
731e90c74813b81dca2991deda78f4a2
-
SHA1
5134f0451e942f801f966daa29e6658129977861
-
SHA256
344ed2e27618aa51d3af356c2b0153419549af1ff61e55b04e633d7e88ee0d13
-
SHA512
d66c179c838f33cf7d062e3e5db1eeb77a578c96a57cfcde99cad368ec4af92b0ce3ae48882701c9c1c06e35fa0020a604b18cedc267d43ed86ca9405cbb018f
-
SSDEEP
768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAIie0LHumD:bCDOw9aMDooc+vAlXnD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 2024-09-19_731e90c74813b81dca2991deda78f4a2_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 1980 lossy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_731e90c74813b81dca2991deda78f4a2_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lossy.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2928 wrote to memory of 1980 2928 2024-09-19_731e90c74813b81dca2991deda78f4a2_cryptolocker.exe 82 PID 2928 wrote to memory of 1980 2928 2024-09-19_731e90c74813b81dca2991deda78f4a2_cryptolocker.exe 82 PID 2928 wrote to memory of 1980 2928 2024-09-19_731e90c74813b81dca2991deda78f4a2_cryptolocker.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_731e90c74813b81dca2991deda78f4a2_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_731e90c74813b81dca2991deda78f4a2_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5cbb50f055a8aba2b99179fcac6a472fc
SHA134a1f831b4b895759706b08d2ba9e463d713be40
SHA25698cdcce6bdb833b560db65bb51292afc4aea1b846a57c58ee2c64d38ac0cbaa5
SHA51231bc1aa880308105f84cad2355ee13f94492efa54b0b15413c742b34a79acc8980a2f88e5e03b307c916b93d34efc20d828474b5c2abf36ee4573aa6308d867e