Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 00:40
Behavioral task
behavioral1
Sample
2024-10-01_d330a1c2be9ecf64b084d9cc559d5cbe_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-10-01_d330a1c2be9ecf64b084d9cc559d5cbe_cryptolocker.exe
-
Size
52KB
-
MD5
d330a1c2be9ecf64b084d9cc559d5cbe
-
SHA1
7e1f86325ef2e11ddf0b819ac83ef666a278b787
-
SHA256
615e4dd2df36c3ed9398c1f7f249fe64338e779a91c7ea6b6fab9affb6c20877
-
SHA512
054136d75b5aa3d9298fdeb0532f42ab3db791c9e88d70177332024e88e3669e7873db638c58ba333fe90093ee52071f33d5293396df6d89b0ed4c33d9c4fd0a
-
SSDEEP
768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtXa:bODOw9acifAoc+vXa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2312 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 2248 2024-10-01_d330a1c2be9ecf64b084d9cc559d5cbe_cryptolocker.exe -
resource yara_rule behavioral1/memory/2248-0-0x0000000008000000-0x000000000800F000-memory.dmp upx behavioral1/memory/2312-16-0x0000000008000000-0x000000000800F000-memory.dmp upx behavioral1/memory/2248-15-0x0000000008000000-0x000000000800F000-memory.dmp upx behavioral1/files/0x000c00000001226a-14.dat upx behavioral1/memory/2312-26-0x0000000008000000-0x000000000800F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-01_d330a1c2be9ecf64b084d9cc559d5cbe_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lossy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2312 2248 2024-10-01_d330a1c2be9ecf64b084d9cc559d5cbe_cryptolocker.exe 31 PID 2248 wrote to memory of 2312 2248 2024-10-01_d330a1c2be9ecf64b084d9cc559d5cbe_cryptolocker.exe 31 PID 2248 wrote to memory of 2312 2248 2024-10-01_d330a1c2be9ecf64b084d9cc559d5cbe_cryptolocker.exe 31 PID 2248 wrote to memory of 2312 2248 2024-10-01_d330a1c2be9ecf64b084d9cc559d5cbe_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-01_d330a1c2be9ecf64b084d9cc559d5cbe_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-01_d330a1c2be9ecf64b084d9cc559d5cbe_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD51ef045aa577c797beb8c1c30a211422f
SHA16d51c496fca6144a51a3f99b72c6f9a56855cd54
SHA2568a2c2a3c7175fd2519225e536893371875ee641492579e3afadcd5439cf17417
SHA512b5b2e354986b815d2a4bb96d4135fb08c8ea9896adc1286a4cc694523473fded8302f71c22aa9f466d4a8c28857173868869bdd83307df3d99e2865f0bed543b