Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
17/08/2023, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
1ef952ebaba54b482873dad2b9df1313_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1ef952ebaba54b482873dad2b9df1313_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
1ef952ebaba54b482873dad2b9df1313_cryptolocker_JC.exe
-
Size
35KB
-
MD5
1ef952ebaba54b482873dad2b9df1313
-
SHA1
e381e764b2aab2cc4e22a27bd4e215e6770a487b
-
SHA256
f45a9732c376242622aec1710eec45a5c27e05f99853ab1e7d9792b3a54caf97
-
SHA512
163661b92b22ac61bd10dc626f02ea376d4c0de7b37a939e52f59369f96ff29cbe3284d328411005f1c26369dccb78d9ca2d91b22a86fff641b2601078323257
-
SSDEEP
384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4l8tFFxE2BodcAOjbQ36ttT+:btB9g/WItCSsAGjX7r3BGub4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1632 gewos.exe -
Loads dropped DLL 1 IoCs
pid Process 1732 1ef952ebaba54b482873dad2b9df1313_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1732 1ef952ebaba54b482873dad2b9df1313_cryptolocker_JC.exe 1632 gewos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1632 1732 1ef952ebaba54b482873dad2b9df1313_cryptolocker_JC.exe 28 PID 1732 wrote to memory of 1632 1732 1ef952ebaba54b482873dad2b9df1313_cryptolocker_JC.exe 28 PID 1732 wrote to memory of 1632 1732 1ef952ebaba54b482873dad2b9df1313_cryptolocker_JC.exe 28 PID 1732 wrote to memory of 1632 1732 1ef952ebaba54b482873dad2b9df1313_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ef952ebaba54b482873dad2b9df1313_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\1ef952ebaba54b482873dad2b9df1313_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD59d85425046a88899a4d79a6273f6fb29
SHA16e92d577a6d732bfe8dd74075c0fef5057abf7e3
SHA256da642e8f3804258bdd4406712f30f6b99f967dab0e8068af86dfa2a019847fd1
SHA5126a1cde00450cb40c61e5e2af9d6dbf9e227e852a2a364d2501aaf4be2b43c84d806ece05256d4421dea2e2cfe3b2523a96e6e5f8c59ad6f6f4d22e2bdec16420
-
Filesize
35KB
MD59d85425046a88899a4d79a6273f6fb29
SHA16e92d577a6d732bfe8dd74075c0fef5057abf7e3
SHA256da642e8f3804258bdd4406712f30f6b99f967dab0e8068af86dfa2a019847fd1
SHA5126a1cde00450cb40c61e5e2af9d6dbf9e227e852a2a364d2501aaf4be2b43c84d806ece05256d4421dea2e2cfe3b2523a96e6e5f8c59ad6f6f4d22e2bdec16420
-
Filesize
35KB
MD59d85425046a88899a4d79a6273f6fb29
SHA16e92d577a6d732bfe8dd74075c0fef5057abf7e3
SHA256da642e8f3804258bdd4406712f30f6b99f967dab0e8068af86dfa2a019847fd1
SHA5126a1cde00450cb40c61e5e2af9d6dbf9e227e852a2a364d2501aaf4be2b43c84d806ece05256d4421dea2e2cfe3b2523a96e6e5f8c59ad6f6f4d22e2bdec16420