Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 19:28

General

  • Target

    2024-02-04_4678e4192465e995a455ab82ac5d7d66_cryptolocker.exe

  • Size

    37KB

  • MD5

    4678e4192465e995a455ab82ac5d7d66

  • SHA1

    7f55fcf4a1a37bb9927724c2de100ee6f28d6a9e

  • SHA256

    b1d3f1447461046ee4a2e7d827c04da36698cece7c89e1873b1f06bc3d7e0719

  • SHA512

    88319c36781a73bee938fc84565470373766875198cc54202509f7ac40fbb7bdf183001984940705e6845728cc2945b34863c22f5952a4346223bbae6f70c404

  • SSDEEP

    384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXuni8LBE1:btB9g/WItCSsAGjX7e9N0hunLS1

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-04_4678e4192465e995a455ab82ac5d7d66_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-04_4678e4192465e995a455ab82ac5d7d66_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2696

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\gewos.exe

          Filesize

          37KB

          MD5

          fc18d08e5b19ef5e1089a341de4640de

          SHA1

          90fb846c24a9fe39007b5d568a89adddfc329d2b

          SHA256

          a15cc977704dbc7316e044850f9f45ef0d2705090492829646605705fa2be9d1

          SHA512

          d6a959ff2193ab528d808444caf0db741f10f11b344ce590a4b7da6db6a865ab96b00700a34bb623588025395d96827d270dc750e18ea0b2d5f4ec5f7084d72d

        • memory/2640-0-0x00000000002E0000-0x00000000002E6000-memory.dmp

          Filesize

          24KB

        • memory/2640-1-0x00000000002E0000-0x00000000002E6000-memory.dmp

          Filesize

          24KB

        • memory/2640-2-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2696-17-0x00000000001F0000-0x00000000001F6000-memory.dmp

          Filesize

          24KB