Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2023, 18:21

General

  • Target

    1ef952ebaba54b482873dad2b9df1313_cryptolocker_JC.exe

  • Size

    35KB

  • MD5

    1ef952ebaba54b482873dad2b9df1313

  • SHA1

    e381e764b2aab2cc4e22a27bd4e215e6770a487b

  • SHA256

    f45a9732c376242622aec1710eec45a5c27e05f99853ab1e7d9792b3a54caf97

  • SHA512

    163661b92b22ac61bd10dc626f02ea376d4c0de7b37a939e52f59369f96ff29cbe3284d328411005f1c26369dccb78d9ca2d91b22a86fff641b2601078323257

  • SSDEEP

    384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4l8tFFxE2BodcAOjbQ36ttT+:btB9g/WItCSsAGjX7r3BGub4

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ef952ebaba54b482873dad2b9df1313_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\1ef952ebaba54b482873dad2b9df1313_cryptolocker_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1632

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\gewos.exe

          Filesize

          35KB

          MD5

          9d85425046a88899a4d79a6273f6fb29

          SHA1

          6e92d577a6d732bfe8dd74075c0fef5057abf7e3

          SHA256

          da642e8f3804258bdd4406712f30f6b99f967dab0e8068af86dfa2a019847fd1

          SHA512

          6a1cde00450cb40c61e5e2af9d6dbf9e227e852a2a364d2501aaf4be2b43c84d806ece05256d4421dea2e2cfe3b2523a96e6e5f8c59ad6f6f4d22e2bdec16420

        • C:\Users\Admin\AppData\Local\Temp\gewos.exe

          Filesize

          35KB

          MD5

          9d85425046a88899a4d79a6273f6fb29

          SHA1

          6e92d577a6d732bfe8dd74075c0fef5057abf7e3

          SHA256

          da642e8f3804258bdd4406712f30f6b99f967dab0e8068af86dfa2a019847fd1

          SHA512

          6a1cde00450cb40c61e5e2af9d6dbf9e227e852a2a364d2501aaf4be2b43c84d806ece05256d4421dea2e2cfe3b2523a96e6e5f8c59ad6f6f4d22e2bdec16420

        • \Users\Admin\AppData\Local\Temp\gewos.exe

          Filesize

          35KB

          MD5

          9d85425046a88899a4d79a6273f6fb29

          SHA1

          6e92d577a6d732bfe8dd74075c0fef5057abf7e3

          SHA256

          da642e8f3804258bdd4406712f30f6b99f967dab0e8068af86dfa2a019847fd1

          SHA512

          6a1cde00450cb40c61e5e2af9d6dbf9e227e852a2a364d2501aaf4be2b43c84d806ece05256d4421dea2e2cfe3b2523a96e6e5f8c59ad6f6f4d22e2bdec16420

        • memory/1632-70-0x0000000000260000-0x0000000000266000-memory.dmp

          Filesize

          24KB

        • memory/1732-54-0x00000000003D0000-0x00000000003D6000-memory.dmp

          Filesize

          24KB

        • memory/1732-56-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1732-55-0x00000000003D0000-0x00000000003D6000-memory.dmp

          Filesize

          24KB