Analysis

  • max time kernel
    125s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2024 10:32

General

  • Target

    2024-10-18_d475e663d7b2bc5d277d38260e90826f_cryptolocker.exe

  • Size

    50KB

  • MD5

    d475e663d7b2bc5d277d38260e90826f

  • SHA1

    198020debcc55db6950b6b0905a5f135ec438440

  • SHA256

    4c5a5b3184fb282fdd92d92b7359451d8949e71c3b5694a66a2b6f857ec15f5b

  • SHA512

    0f67dcd83a6b6551c3334c5c5fc665e65bd5da4a2aa12bb5402a0c5d38d7296da3edd4fce53ef8a8491d1c677dcbfadc896199cbd97eb314250163b96091c114

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4ICNBCXK9z:bIDOw9a0DwitDZzA

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-18_d475e663d7b2bc5d277d38260e90826f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-18_d475e663d7b2bc5d277d38260e90826f_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    50KB

    MD5

    80a0ead7d33c8821f33473b781493b08

    SHA1

    654146edb68aed03ae4fa1bfe6e24062d393824b

    SHA256

    59b5bcc58a147d822648909396b28397331a444d58b10df450cc3f0090b862b9

    SHA512

    154efaaf710dc69af7cb655115e755b1696dfa4290a55043acd26059ccd2f6c91af699c0d2fded8106ba79c384094d304e0571bb200ad2996dc3d89de10a284a

  • memory/2180-8-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2180-1-0x0000000001C90000-0x0000000001C96000-memory.dmp

    Filesize

    24KB

  • memory/2180-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2724-15-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB