Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-31_238f3ca19e50da28941c4a15be19b508_cryptolocker.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-31_238f3ca19e50da28941c4a15be19b508_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-31_238f3ca19e50da28941c4a15be19b508_cryptolocker.exe
-
Size
43KB
-
MD5
238f3ca19e50da28941c4a15be19b508
-
SHA1
49d6f1f9f431c8bc3f7005f5d2ab872529842bf6
-
SHA256
8346c148c203d4067e8695db07c016db287ebcfb4a4bfc0bba3480908d40335f
-
SHA512
5a8c85b20e46db700e5b50f34066141fb86c6367e864c2f9c2e0712338f3c00b589251a3cd82a38177c54b8b832fb5fe019b52924f1ecab4e59eed2e630ef5d5
-
SSDEEP
768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAqjrN5:bCDOw9aMDooc+vAqjZ5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2720 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 1580 2024-10-31_238f3ca19e50da28941c4a15be19b508_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-31_238f3ca19e50da28941c4a15be19b508_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lossy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2720 1580 2024-10-31_238f3ca19e50da28941c4a15be19b508_cryptolocker.exe 30 PID 1580 wrote to memory of 2720 1580 2024-10-31_238f3ca19e50da28941c4a15be19b508_cryptolocker.exe 30 PID 1580 wrote to memory of 2720 1580 2024-10-31_238f3ca19e50da28941c4a15be19b508_cryptolocker.exe 30 PID 1580 wrote to memory of 2720 1580 2024-10-31_238f3ca19e50da28941c4a15be19b508_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-31_238f3ca19e50da28941c4a15be19b508_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-31_238f3ca19e50da28941c4a15be19b508_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5d6e3e37c47c07d60a8e6d461e1ab6319
SHA145ce5699add4ed3337ea25e96500dc91c463593c
SHA2566580a2ae4d26d90f7111006441e6737f011cb505627e72b81377088930a58c78
SHA512501d3c2797c08eeb5f3783d31bf130f67792785e3fb2754b7ef4509edc876c33e4460b7ee29b800979b7904c1a10e09b19524c3edd7d3e8952b20644ec649f84