Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 05:29

General

  • Target

    2024-11-20_fcb268ae9020f771175891766830a4c6_cryptolocker.exe

  • Size

    45KB

  • MD5

    fcb268ae9020f771175891766830a4c6

  • SHA1

    567788592d7eedf49e9f2a2c7b0a579473160786

  • SHA256

    843b4b5534015ab1154a1ba84431f60c065db61aa800d0ba67524f745cdf2681

  • SHA512

    26a8fabab52b3d3d28d26a7c89a0801a427ebffcf22b76cc4c8bb687fb5c182ff11050984347d248f5c8d6ddbc19c450f49461374f7928f589525fd8b2dd7c3d

  • SSDEEP

    768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAqjrh:bCDOw9aMDooc+vAqj9

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-20_fcb268ae9020f771175891766830a4c6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-20_fcb268ae9020f771175891766830a4c6_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    45KB

    MD5

    dbcda13d263bed364e7cfe3cfb09e16a

    SHA1

    49fa3bb9a2e9ea94d0ce9aadf932b34b6dc52d4e

    SHA256

    3ac1ac27d3a82d6ba230324406bfa23b0d69ddf8562a2a7a2b87d52ea5975032

    SHA512

    9dce084dbf21fe4f5c4cb963c83cf86f65fcb2daeace68090a5e6155ae337e2e25000d9b6ba53d803c15f41c9bf73b49ace4437bbff15d23e66db78d3656f9f1

  • memory/1728-0-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/1728-2-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/1728-1-0x0000000000370000-0x0000000000376000-memory.dmp

    Filesize

    24KB

  • memory/1728-9-0x0000000000370000-0x0000000000376000-memory.dmp

    Filesize

    24KB

  • memory/1728-15-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/1968-16-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/1968-18-0x0000000001C10000-0x0000000001C16000-memory.dmp

    Filesize

    24KB

  • memory/1968-25-0x00000000001E0000-0x00000000001E6000-memory.dmp

    Filesize

    24KB

  • memory/1968-26-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB