Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2023 15:26

General

  • Target

    30ceddff5d1d82f151b69ed20d2addf3_cryptolocker_JC.exe

  • Size

    35KB

  • MD5

    30ceddff5d1d82f151b69ed20d2addf3

  • SHA1

    48f0baa146b424417db130e45de3f71a5d33f6fb

  • SHA256

    c86a82f93d6e473eca1da968942a732d24aca6dd7500a00a6d6100fb02014ac8

  • SHA512

    016e82ce42b4ff02f29a5bb725e1d5cac6a1905ddc907145dfc39c6eaffde2f5fa2bd759f4efff142055a70d42a7e9f90e9446e1cecc3a108752f4b0c99096c8

  • SSDEEP

    384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4l8tFFxE2B94IOMHo3sxP1Hv:btB9g/WItCSsAGjX7r3BPOMHocM4vUUX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30ceddff5d1d82f151b69ed20d2addf3_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\30ceddff5d1d82f151b69ed20d2addf3_cryptolocker_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    35KB

    MD5

    01bf9a2b62aa8a76f74a7b134d291724

    SHA1

    42746a1ea4a6666e7c3fb0c2c306391b11da09fd

    SHA256

    f205ab83db451396b96aac228719b7561671878d6652738087639ea6865e9385

    SHA512

    dc954f93669979a4a3e3fc5a2ccee244638999041481c4c35539f2d48710b6074f2ce29d5923e274c33802dbe999997a99c8edc6833b17425d02b30e73a47f41

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    35KB

    MD5

    01bf9a2b62aa8a76f74a7b134d291724

    SHA1

    42746a1ea4a6666e7c3fb0c2c306391b11da09fd

    SHA256

    f205ab83db451396b96aac228719b7561671878d6652738087639ea6865e9385

    SHA512

    dc954f93669979a4a3e3fc5a2ccee244638999041481c4c35539f2d48710b6074f2ce29d5923e274c33802dbe999997a99c8edc6833b17425d02b30e73a47f41

  • \Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    35KB

    MD5

    01bf9a2b62aa8a76f74a7b134d291724

    SHA1

    42746a1ea4a6666e7c3fb0c2c306391b11da09fd

    SHA256

    f205ab83db451396b96aac228719b7561671878d6652738087639ea6865e9385

    SHA512

    dc954f93669979a4a3e3fc5a2ccee244638999041481c4c35539f2d48710b6074f2ce29d5923e274c33802dbe999997a99c8edc6833b17425d02b30e73a47f41

  • memory/2552-54-0x00000000003A0000-0x00000000003A6000-memory.dmp

    Filesize

    24KB

  • memory/2552-56-0x00000000003A0000-0x00000000003A6000-memory.dmp

    Filesize

    24KB

  • memory/2552-55-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2692-71-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB