Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 05:29

General

  • Target

    2024-09-19_54bad38f45dc0ce55b16f162c537110c_cryptolocker.exe

  • Size

    43KB

  • MD5

    54bad38f45dc0ce55b16f162c537110c

  • SHA1

    0a6a323f8d0dbfe1a3f0fb961cf2c94f4542ef73

  • SHA256

    491af073726c78879e17431a9dafe95e0589233327092f7d0455a316496df8f3

  • SHA512

    ae2cad4aec99c4643c5e14bd39286b98fddd3e9fbd2415779c5e20dbd2c3c5e25907e5a74b9ecd506d2bf06e7fc591072b8e207dae5d779995573668bfc40210

  • SSDEEP

    768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAqjrm:bCDOw9aMDooc+vAqji

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-19_54bad38f45dc0ce55b16f162c537110c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-19_54bad38f45dc0ce55b16f162c537110c_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:212
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    43KB

    MD5

    2fe221ed6e0dfe89d5ea11962a3a2953

    SHA1

    2741d128cf24c04407a2453e92f554aa3d04d87b

    SHA256

    938c00126f37b155ce331c35d211f68a48d10de914819ef66a22f7e02b550833

    SHA512

    b982639d13bc30b04177f676bbac3526d25d9fab093fe47cca8529acbe48a8fe472c9fda5be17c709221997d2d942158ac285bce4ea518c6fba22c0c026f619b

  • memory/212-0-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/212-1-0x00000000021F0000-0x00000000021F6000-memory.dmp

    Filesize

    24KB

  • memory/212-2-0x00000000021F0000-0x00000000021F6000-memory.dmp

    Filesize

    24KB

  • memory/212-3-0x0000000002220000-0x0000000002226000-memory.dmp

    Filesize

    24KB

  • memory/212-17-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/2476-19-0x00000000020D0000-0x00000000020D6000-memory.dmp

    Filesize

    24KB

  • memory/2476-25-0x00000000020B0000-0x00000000020B6000-memory.dmp

    Filesize

    24KB

  • memory/2476-26-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB