Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/10/2024, 00:33

General

  • Target

    2024-10-15_ace7cf7b8f94dcff814582982f0c06eb_cryptolocker.exe

  • Size

    28KB

  • MD5

    ace7cf7b8f94dcff814582982f0c06eb

  • SHA1

    1f5af7461ec5af29f664115dc749163c910b7b85

  • SHA256

    991a87359ed490ce3f1c3bf015ae78359340b36be81aeb701179c37fdb742850

  • SHA512

    de533bb542c100194da2f6284bde97c2c63e5811476aaf314cc3d6644510930c915c6cf555b6697a87662a6c2d41bbb0908fb409e043704b00aa328914cd5e05

  • SSDEEP

    384:bFgFQrdSmuQ8WFqxpj5cpyIuYxVe3FSr+OLfjDp+0g/HNblX7QCOBqJ:bFgm5zusFUB2preAr+Ofjg0STX73OBqJ

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-15_ace7cf7b8f94dcff814582982f0c06eb_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-15_ace7cf7b8f94dcff814582982f0c06eb_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1836
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      PID:5116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    28KB

    MD5

    57711ac5aa9dbbd5e8b1ced397f542d7

    SHA1

    e79d8f8d9cd36d18d5bdea44824ff09a01290fcc

    SHA256

    4f4694b7e93b0dc3ae7a1d193c5cce2b1c7c4a9d7a2a2b02a692855c5539839b

    SHA512

    7067d545463ff37e4ce9a340aa9ae827c7f9d7e8708745516ef8bc44840747f56e35886b284e162e7675e3d114bf442e0c19284f4ec87db3d74b1e76f1749fd6

  • C:\Users\Admin\AppData\Local\Temp\swenled.exe

    Filesize

    537B

    MD5

    590a2a16db7c9454e5429278e1e95347

    SHA1

    11dd68b8c510df635ff033c58fa002fdcd196927

    SHA256

    c5ffd9dbef8cebbf04436e0680847b95be3f8140e3b3d1e99fe7e743799dfd97

    SHA512

    7e55708920fe2541ab1236c7616d67fd85795e80bc5f399d9b101372c347534940f2f81d942bb094c2d188b23a3501439443afbc0ca142758708c909c009cfa3

  • memory/1836-0-0x0000000008000000-0x000000000800E000-memory.dmp

    Filesize

    56KB

  • memory/1836-1-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/1836-2-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/1836-3-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB

  • memory/1836-18-0x0000000008000000-0x000000000800E000-memory.dmp

    Filesize

    56KB

  • memory/5116-20-0x0000000002100000-0x0000000002106000-memory.dmp

    Filesize

    24KB

  • memory/5116-48-0x0000000008000000-0x000000000800E000-memory.dmp

    Filesize

    56KB