Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2024, 01:22

General

  • Target

    2024-10-03_4e9a6ef53c3c271bdd0c39adf4734596_cryptolocker.exe

  • Size

    28KB

  • MD5

    4e9a6ef53c3c271bdd0c39adf4734596

  • SHA1

    ff8cf0c54380fa60ccf03452e628956a720ee1e0

  • SHA256

    6be9a689d87bf4cdb71f2156f49506caad629bbffed180dcc9dc2c98b86e77ff

  • SHA512

    4c35d461affa6d515bf33019803d5ad5e8ca664e9e2d6507094f65874b365ba7bb9d21afe8ea7902494889fd5e03c4c973ef978b23db120d0841c831f6d7ad9e

  • SSDEEP

    384:bFgFQrdSmuQ8WFqxpj5cpyIuYxVe3FSr+OLfjDp+0g/HNblX7QCOBq6:bFgm5zusFUB2preAr+Ofjg0STX73OBq6

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-03_4e9a6ef53c3c271bdd0c39adf4734596_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-03_4e9a6ef53c3c271bdd0c39adf4734596_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:664
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1560

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lossy.exe

          Filesize

          28KB

          MD5

          0249bd3564ffa168224d092358c8662b

          SHA1

          9aeb42a3ee60967fa1d44fb6d7de4165da18b9b7

          SHA256

          2800f9a63a8af05c507e125a4ed62eb45667e7f0b4bac569fd37fca87e6a526d

          SHA512

          a19acb69deea42a0b53620ef24201058103250e85a91de38cfa92475594a1dc6f69c252ba23430622537f8201699618b5194f855ad34f5b48cef2a0db6ef056f

        • memory/664-0-0x0000000008000000-0x000000000800E000-memory.dmp

          Filesize

          56KB

        • memory/664-1-0x00000000020D0000-0x00000000020D6000-memory.dmp

          Filesize

          24KB

        • memory/664-2-0x00000000020D0000-0x00000000020D6000-memory.dmp

          Filesize

          24KB

        • memory/664-3-0x00000000020F0000-0x00000000020F6000-memory.dmp

          Filesize

          24KB

        • memory/664-17-0x0000000008000000-0x000000000800E000-memory.dmp

          Filesize

          56KB

        • memory/1560-19-0x00000000006A0000-0x00000000006A6000-memory.dmp

          Filesize

          24KB

        • memory/1560-20-0x00000000006C0000-0x00000000006C6000-memory.dmp

          Filesize

          24KB

        • memory/1560-26-0x0000000008000000-0x000000000800E000-memory.dmp

          Filesize

          56KB