Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2024 06:25

General

  • Target

    2024-10-14_43def853cb114cee4da61dc50577cd37_cryptolocker.exe

  • Size

    43KB

  • MD5

    43def853cb114cee4da61dc50577cd37

  • SHA1

    a2a5e0ba5de67660df034ee2668aa0276932372e

  • SHA256

    b4071c35cab39fef017da43175ca11eecd823913199498f8c3f023391786145f

  • SHA512

    67c9ffdc59faa8ebfefd4d1c2c5e317ca864d46b9e1b114e484b2db0b8439dcfd773b158e0ed604d6ce54f3a58f9b838f5a28a7ce207229b25a3dadd52a2cf79

  • SSDEEP

    768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtA/Q:bCDOw9aMDooc+vA/Q

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-14_43def853cb114cee4da61dc50577cd37_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-14_43def853cb114cee4da61dc50577cd37_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:880
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    43KB

    MD5

    2de8896f8cde0777367bb9f7ad4bf0f3

    SHA1

    0faab7881004efc6dfa66e3b816f29fbebfa09f9

    SHA256

    91e23efdba7cc422842adcd3a1f15664270c2ad43fcd0e21f511ad21c60e10d8

    SHA512

    6048e1bcefc320a3b02a4d8c183f2ce9155547290609955689d4680d6ccbd20ec3796164aab3d332120a8920db6e29ad77a40f0886d76ab6eadc3fcad2bceda9

  • memory/880-0-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/880-1-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/880-9-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/880-2-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/880-14-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/2812-16-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/2812-18-0x0000000000370000-0x0000000000376000-memory.dmp

    Filesize

    24KB

  • memory/2812-25-0x0000000000330000-0x0000000000336000-memory.dmp

    Filesize

    24KB

  • memory/2812-26-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB