Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 04:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_20b227bd524e84a3ae01e63a01cbf90d_cryptolocker.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-12_20b227bd524e84a3ae01e63a01cbf90d_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_20b227bd524e84a3ae01e63a01cbf90d_cryptolocker.exe
-
Size
5.5MB
-
MD5
20b227bd524e84a3ae01e63a01cbf90d
-
SHA1
ac51bb815b96f55a44e7b047e4b450c41f0cb878
-
SHA256
e8c8a1de615418651be64c24f8f126d8e94e5700511c6af635302f56f3536c02
-
SHA512
30b05079d6e9def31161044085ecfdf4f1e1f167a01342737d77c367249313c7fde34825b9da465a6d770a9e0f37f23c5069f1af5fc69eec2ccda3575dabd684
-
SSDEEP
98304:ot1QKvyjzO6B3DenIMmzyxD++XsBq+JUieGNt3sB/a1Ed9m+UfK:otTvgz73XMpxDbcwYvt3sFa4OK
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 2024-10-12_20b227bd524e84a3ae01e63a01cbf90d_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 800 lossy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lossy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_20b227bd524e84a3ae01e63a01cbf90d_cryptolocker.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4784 2024-10-12_20b227bd524e84a3ae01e63a01cbf90d_cryptolocker.exe 4784 2024-10-12_20b227bd524e84a3ae01e63a01cbf90d_cryptolocker.exe 800 lossy.exe 800 lossy.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4784 wrote to memory of 800 4784 2024-10-12_20b227bd524e84a3ae01e63a01cbf90d_cryptolocker.exe 86 PID 4784 wrote to memory of 800 4784 2024-10-12_20b227bd524e84a3ae01e63a01cbf90d_cryptolocker.exe 86 PID 4784 wrote to memory of 800 4784 2024-10-12_20b227bd524e84a3ae01e63a01cbf90d_cryptolocker.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_20b227bd524e84a3ae01e63a01cbf90d_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-12_20b227bd524e84a3ae01e63a01cbf90d_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD541a4b81b1082e7a18d699738e20a2a3a
SHA11601950e5ea9f1ba7eb354bebae09b6ac196d3e3
SHA25671c21fc197d517b748ab65a957b1def09a40d99a707090f9c3dfed9d06e74ffc
SHA5125715e854acaea1e67c64d110ad9eb038228ad9bb976ab5a974a0579411753a740dda7d2f6f3fa064aeeb4e06b109d1c0754098812aceda9ed41ff02eee185447