Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2024 00:04

General

  • Target

    2024-10-17_d38cf940e05f696d1196e4b483423734_cryptolocker.exe

  • Size

    50KB

  • MD5

    d38cf940e05f696d1196e4b483423734

  • SHA1

    268ebc328270b979f341ac4c111c4eb5e46dc359

  • SHA256

    bfc1ad96bc14b1507a8ce408711f28dd0e6e35aaed008797c3d6f8ba625d23a7

  • SHA512

    556032045de54180c9510f2f0857300641590f04bc941eeaa459f3512e35579a3fac75fe8e4a02ca3ef87bbbf19436bfd1a786fa51c6c7c2addc6fef289c06fc

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4ICNBCXK9Xbb6Q:bIDOw9a0DwitDZzcP6Q

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-17_d38cf940e05f696d1196e4b483423734_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-17_d38cf940e05f696d1196e4b483423734_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    50KB

    MD5

    5cdd42d96fc687304042ecc7de74e547

    SHA1

    6367e3606bda6d63a9e159c138b794e227b68073

    SHA256

    418882e6800672c94009ae088be0b6237e591ea7487cecb0fc2be0d4af50e17c

    SHA512

    4f825f5ec0bd519d89e8be60bb11ae8bfa695c6089dc83fd592c3156a1ea37161fad6868e4ab6dda88543cd5dd6ca05f85f5d2cec8bc88932e27e796ec2a693e

  • memory/1976-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/1976-2-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/1976-1-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2784-15-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2784-16-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB