Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 11:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-24_76bd82c707c683cfb4444f520345fd5b_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-24_76bd82c707c683cfb4444f520345fd5b_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-24_76bd82c707c683cfb4444f520345fd5b_cryptolocker.exe
-
Size
43KB
-
MD5
76bd82c707c683cfb4444f520345fd5b
-
SHA1
d84021b853ca07b4aa4404211aa1ccd39022c3e2
-
SHA256
6c678fa74231230cb8559ba85e9a9c6963da55660565c696b8b2b127a21f23c1
-
SHA512
b524e3e9d4f94f79a4dbad0d9bf051e8a5205c5e268a264cd10bb71342ececce8aa99122590cd16f96752ec5b5243ee1cef2c5093c8bf10f519a4b2a9d6b3ed9
-
SSDEEP
768:btB9g/WItCSsAGjX7r3BPOMHocM4vUUOmJ+96eg+:btB9g/xtCSKfxLIcMzUw96K
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012233-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2460 gewos.exe -
Loads dropped DLL 1 IoCs
pid Process 1216 2024-01-24_76bd82c707c683cfb4444f520345fd5b_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1216 2024-01-24_76bd82c707c683cfb4444f520345fd5b_cryptolocker.exe 2460 gewos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2460 1216 2024-01-24_76bd82c707c683cfb4444f520345fd5b_cryptolocker.exe 28 PID 1216 wrote to memory of 2460 1216 2024-01-24_76bd82c707c683cfb4444f520345fd5b_cryptolocker.exe 28 PID 1216 wrote to memory of 2460 1216 2024-01-24_76bd82c707c683cfb4444f520345fd5b_cryptolocker.exe 28 PID 1216 wrote to memory of 2460 1216 2024-01-24_76bd82c707c683cfb4444f520345fd5b_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_76bd82c707c683cfb4444f520345fd5b_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_76bd82c707c683cfb4444f520345fd5b_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5ee28b6aff3e8c395c3b1bdf81b4098c5
SHA1356284a0a4947c47ced98282c517baf36f3719ad
SHA2565c7351891fb7d2698317025432784b909fcca15d15566d3f26751e8d37d38823
SHA5122a245ccf8b252f7c331368c97151a928cb8371690e6e303d4930a450d196fc47e7f53ab77742ebbbeaf7a3116329516bf4faecbc60d5da5ec5147cddfa9a4f9a