Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/02/2024, 03:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-02_e9bca2ae58dac1478835de575406487b_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-02_e9bca2ae58dac1478835de575406487b_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-02_e9bca2ae58dac1478835de575406487b_cryptolocker.exe
-
Size
34KB
-
MD5
e9bca2ae58dac1478835de575406487b
-
SHA1
dad48a9a92fc2a86423b08d22478404a48693b7e
-
SHA256
c3138c658c09390fc3a60678540040a78a4665488518ac3fc2f94e75efb2c46a
-
SHA512
228c35bb82e82e0645635538548d55fc15ee901260c95d72426123de5316e806ed083392f3e81355f6f69f4d72a82360149b8d90a1d296f6c00519ce0bc0779c
-
SSDEEP
384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiA0jgg183nC:btB9g/WItCSsAGjX7e9N4
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000a00000001226e-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 1340 gewos.exe -
Loads dropped DLL 1 IoCs
pid Process 2064 2024-02-02_e9bca2ae58dac1478835de575406487b_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2064 2024-02-02_e9bca2ae58dac1478835de575406487b_cryptolocker.exe 1340 gewos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 1340 2064 2024-02-02_e9bca2ae58dac1478835de575406487b_cryptolocker.exe 28 PID 2064 wrote to memory of 1340 2064 2024-02-02_e9bca2ae58dac1478835de575406487b_cryptolocker.exe 28 PID 2064 wrote to memory of 1340 2064 2024-02-02_e9bca2ae58dac1478835de575406487b_cryptolocker.exe 28 PID 2064 wrote to memory of 1340 2064 2024-02-02_e9bca2ae58dac1478835de575406487b_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-02_e9bca2ae58dac1478835de575406487b_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-02_e9bca2ae58dac1478835de575406487b_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD540874ebe649043833999798cc1ea5a4b
SHA12341db78662d1f8c0539bd7624736dfcf93fa43b
SHA25668855f02c50ce1e7275c01277f20ed8c3a7782961453056ab71d6d8944442450
SHA5124bc8743f4db55573158f1e50a22304de4481e01091ffe3e9feb341cd3559a1c49ebf0fd5d94d2a720b04d04ed394f8e6a0c942a8c80d5081b5a46a62bbd76a37