Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12-02-2024 19:24

General

  • Target

    2024-02-12_6401ac593a0c4e0c62503174c27ed859_cryptolocker.exe

  • Size

    44KB

  • MD5

    6401ac593a0c4e0c62503174c27ed859

  • SHA1

    9cc0e90d50ea892d13b9b790f9f2312afcc6ebdd

  • SHA256

    8b356a2b9fafc5d496579c2fd739178cb49e31aeb845ae28574321b439598629

  • SHA512

    5ae81f57a0a2839765abaf01dcaf7e3d11ce73387ab72a36a3a39f65a1eb88d99827634cafe7619a7703888e7072dde2cbbc8d474538165ca2408526d84e9d74

  • SSDEEP

    768:btB9g/WItCSsAGjX7r3BPOMHocM4vUUOmJ+96egDy:btB9g/xtCSKfxLIcMzUw96ny

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-12_6401ac593a0c4e0c62503174c27ed859_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-12_6401ac593a0c4e0c62503174c27ed859_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    44KB

    MD5

    ba4d837298b794ad4d3c3f3421f8de36

    SHA1

    09a1cad2e5b39efd81e01002a1629b4c26399a16

    SHA256

    2672275fc30b0d89bf2018a46a0badf15d9953205e0575f2279955416ab3613e

    SHA512

    b2312e2c3c600c44342ae73766ab84114b128dcbcf118a603b891193e91d548992588fe3f2e6c943e85b9e1417dc8400ed2d818941987ca4439c58bb30c4eb8c

  • memory/2272-16-0x00000000001F0000-0x00000000001F6000-memory.dmp

    Filesize

    24KB

  • memory/2420-0-0x0000000000260000-0x0000000000266000-memory.dmp

    Filesize

    24KB

  • memory/2420-2-0x0000000000260000-0x0000000000266000-memory.dmp

    Filesize

    24KB

  • memory/2420-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB