Analysis

  • max time kernel
    141s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 00:04

General

  • Target

    2024-10-17_d38cf940e05f696d1196e4b483423734_cryptolocker.exe

  • Size

    50KB

  • MD5

    d38cf940e05f696d1196e4b483423734

  • SHA1

    268ebc328270b979f341ac4c111c4eb5e46dc359

  • SHA256

    bfc1ad96bc14b1507a8ce408711f28dd0e6e35aaed008797c3d6f8ba625d23a7

  • SHA512

    556032045de54180c9510f2f0857300641590f04bc941eeaa459f3512e35579a3fac75fe8e4a02ca3ef87bbbf19436bfd1a786fa51c6c7c2addc6fef289c06fc

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4ICNBCXK9Xbb6Q:bIDOw9a0DwitDZzcP6Q

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-17_d38cf940e05f696d1196e4b483423734_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-17_d38cf940e05f696d1196e4b483423734_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      PID:4300

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lossy.exe

          Filesize

          50KB

          MD5

          5cdd42d96fc687304042ecc7de74e547

          SHA1

          6367e3606bda6d63a9e159c138b794e227b68073

          SHA256

          418882e6800672c94009ae088be0b6237e591ea7487cecb0fc2be0d4af50e17c

          SHA512

          4f825f5ec0bd519d89e8be60bb11ae8bfa695c6089dc83fd592c3156a1ea37161fad6868e4ab6dda88543cd5dd6ca05f85f5d2cec8bc88932e27e796ec2a693e

        • C:\Users\Admin\AppData\Local\Temp\swenled.exe

          Filesize

          537B

          MD5

          590a2a16db7c9454e5429278e1e95347

          SHA1

          11dd68b8c510df635ff033c58fa002fdcd196927

          SHA256

          c5ffd9dbef8cebbf04436e0680847b95be3f8140e3b3d1e99fe7e743799dfd97

          SHA512

          7e55708920fe2541ab1236c7616d67fd85795e80bc5f399d9b101372c347534940f2f81d942bb094c2d188b23a3501439443afbc0ca142758708c909c009cfa3

        • memory/1268-0-0x0000000002200000-0x0000000002206000-memory.dmp

          Filesize

          24KB

        • memory/1268-1-0x0000000002200000-0x0000000002206000-memory.dmp

          Filesize

          24KB

        • memory/1268-2-0x0000000002220000-0x0000000002226000-memory.dmp

          Filesize

          24KB

        • memory/4300-17-0x0000000000740000-0x0000000000746000-memory.dmp

          Filesize

          24KB

        • memory/4300-23-0x0000000000590000-0x0000000000596000-memory.dmp

          Filesize

          24KB