Analysis

  • max time kernel
    0s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 11:18

General

  • Target

    2024-11-21_e91f351852b3ed5bc4d5959bfdd9e2a6_cryptolocker.exe

  • Size

    45KB

  • MD5

    e91f351852b3ed5bc4d5959bfdd9e2a6

  • SHA1

    19dc2039a6ca7596d1f54f79b17069924d6917e2

  • SHA256

    fcb145416251f857e1b9c2741c4c97c282d13fd84f24bb400d2974024fabec20

  • SHA512

    afbea8f1cf4f93503f43fe8eb87cdf6f4a185e8f1efecd1627d9e0b33279ba87507283a9dd9bd0202501306d2ba589a88dff651b288c0fe8a0fedfb0dee9c446

  • SSDEEP

    768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAIie0LHt:bCDOw9aMDooc+vAlXt

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-21_e91f351852b3ed5bc4d5959bfdd9e2a6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-21_e91f351852b3ed5bc4d5959bfdd9e2a6_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    45KB

    MD5

    22b76f2ace786926d33aeb2ffbe1bf57

    SHA1

    dd86fd98a20f65f0658f4a642fdca1dc5a3788ea

    SHA256

    cb70856288b01b3e6515a7944e4c9ea2e6094d5873d6e4fcc0d976ae913c2d8a

    SHA512

    f07c80ad494ff0864c0cee1041b5fb54f0f4888dea24da651c74383a0e2cf87e1c6ae81c65cceb7aa240c817acb611a575095543bdd26ba4edb60a4c3b2d9984

  • memory/376-3-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/376-15-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/376-2-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/376-1-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/376-0-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/2776-18-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/2776-16-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/2776-25-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB