Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 03:50

General

  • Target

    2024-10-04_d906f5ce7dbc6b186cb707ed7fd38854_cryptolocker.exe

  • Size

    28KB

  • MD5

    d906f5ce7dbc6b186cb707ed7fd38854

  • SHA1

    ac592751f627ebc262bc9f7717ecd260dbe95f6d

  • SHA256

    06c0eb49adf96246a48b62454f7e52405e18248e072fea967b9fcb58a26ddccf

  • SHA512

    7d326cbd32d3aafed26ba9bca87276605f6082b7ade3d6506173b2523d5bae4d56187a33d6fc55ff27bd17c61745cc6dabe69156ce7bf9c2bebd36d6f0ce0d3f

  • SSDEEP

    384:bFgFQrdSmuQ8WFqxpj5cpyIuYxVe3FSr+OLfjDp+0g/HNblX7QCOBqTf:bFgm5zusFUB2preAr+Ofjg0STX73OBqj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-04_d906f5ce7dbc6b186cb707ed7fd38854_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-04_d906f5ce7dbc6b186cb707ed7fd38854_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2848

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lossy.exe

          Filesize

          28KB

          MD5

          71c914c7465b74784e7a173c05f13ffc

          SHA1

          a276283bc90301e6d4bc357f79b62aafaad3e666

          SHA256

          50e8020d674bedfb1ac14436393f7594b93b3893add14768a91bf3ed89ae397f

          SHA512

          bb05898408b59ee343a02667a8a2872cc75bc1e1f849b17914970da96985608aeebef8fa1efcb17e51d101033eaaab1a32ec2493dbc3b698b86ebfb2741a83bf

        • memory/2848-17-0x0000000008000000-0x000000000800E000-memory.dmp

          Filesize

          56KB

        • memory/2848-26-0x0000000008000000-0x000000000800E000-memory.dmp

          Filesize

          56KB

        • memory/2920-0-0x0000000008000000-0x000000000800E000-memory.dmp

          Filesize

          56KB

        • memory/2920-1-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/2920-9-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/2920-2-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB

        • memory/2920-15-0x0000000008000000-0x000000000800E000-memory.dmp

          Filesize

          56KB